Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Automated Certificate Management for Control Plane Components #629

Open
jlnhnng opened this issue Nov 12, 2024 · 0 comments
Open

Automated Certificate Management for Control Plane Components #629

jlnhnng opened this issue Nov 12, 2024 · 0 comments

Comments

@jlnhnng
Copy link

jlnhnng commented Nov 12, 2024

This feature request proposes adding automated support for managing custom Certificate Authorities (CA) and associated certificates as part of the templating system within hmc. This enhancement is essential for enterprise environments with stringent security requirements that require custom CAs for internal PKI integration, specifically for the kubernetes api, etcd, sa, and proxy certificates.

Before a cluster gets created the certificates and keys used for bootstrapping need to be existing. When these certificates are available in the namespace, are named correctly and have the correct label set k0smotron will use these when the k0scontrolplane gets created. The procedure is the same as with CABPK: https://cluster-api.sigs.k8s.io/tasks/certs/using-custom-certificates

The creation of the certificates need to happen when a cluster gets created with a template.

Feature Requirements

  1. Support for Custom CA Certificates:
  • Allow administrators to specify a custom CA certificate, which hmc will use.
  1. Automated Certificate Distribution and Rotation:
  • Automate the distribution of these custom certificates to the appropriate namespaces of clusters.
  • Enable periodic or triggered certificate rotation, adhering to enterprise PKI requirements.

Potential Challenges

  • Certificate Rotation: Implementing automated rotation that meets both CAPI requirements and enterprise PKI policies could require a robust solution for tracking and updating certificates across the distributed system.
  • Configuration Complexity: Adding custom CA support may introduce complexity into the templating system, requiring careful design to maintain usability.
  • Multi-Distribution Support: Expanding support for additional distributions, such as EKS and AKS, introduces variability in certificate handling, as each distribution has its unique approach to CA management and certificate configuration. Ensuring consistent functionality across these different Kubernetes distributions will require handling distribution-specific differences in a standardized manner within hmc.

Benefits

  • Security Compliance: Meets the needs of enterprise environments with strict PKI requirements.
  • Ease of Use: Provides a seamless, automated experience for administrators, reducing the need for manual certificate management.
  • Scalability: Supports enterprise-scale deployment, where certificate rotation and management can be a challenge without automation.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: Todo
Development

No branches or pull requests

1 participant