Replies: 1 comment
-
I just realized that my "claims": {
"maxTLSCertDuration": "2160h",
"defaultTLSCertDuration": "2160h"
},
"options": {
"x509": {
"templateFile": "templates/x509/kubernetes.tpl",
"templateData": {
"OrganizationalUnit": "Kubernetes The Hard Way"
}
}
} I suspect this caused all the certificates to be created without using the template. This was almost certainly caused by the problem I attempted to patch in smallstep/kubernetes-the-hard-way#2 but apparently I forgot to use the fixed command and ended up issuing all the certificates with the default config that doesn't reference the I fixed |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I'm following @tashian's adaptation of Kubernetes the Hard Way with Step CA. I ran into a problem in step 8, "bootstrapping controllers". It's in this step that user
admin
first connects to the apiserver with a kubeconfig. The symptom I'm troubleshooting:Upon inspection, admin's client cert has subject, so if I understand correctly this property is missing the expected value
O=system:masters
:$ openssl x509 -noout -subject < admin.pem subject=CN = admin
Admin's client cert was created with this command:
With provisioner template
/etc/step-ca/templates/x509/kubernetes.tpl
:I suspect a mismatch between the template reference
.Insecure.User.Organization
and thestep ca certificate --set "Organization=system:masters"
command.Beta Was this translation helpful? Give feedback.
All reactions