-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Too many certificate files being generated for EKS Optimized AMI v.12 #244
Comments
We also encounter this problem. amazon-eks-node-1.12-v20190329 (ami-08716b70cac884aaa) |
Hi, thanks for reporting this. This issue affects 1.12 and is a result of the EKS certificate signer not adding public DNS names and public IPs to kubelet certificates, causing the kubelet to re-request a new certificate ever few seconds. We'll be rolling out a control plane fix to resolve this issue for 1.12 clusters shortly. If this is impacting kubelet operations for you, as a mitigation you can either use the 1.11 AMI, or run your nodes in non-public subnets and you should see this behavior stop. If you are using Prometheus for monitoring and you're scraping the kube API servers, you can use the following PromQL query to monitor activity:
And if you want to compare the total rate of CSRs for 1.11 vs 1.12 kubelets in your cluster:
|
Hi, Do you have an ETA for a patch on this issue ? |
Hi, Whats the status of this issue? |
Hi all, this has been resolved globally on the EKS side and no customer action is required. This is also fixed for instances in VPCs with custom DHCP option sets. If you are using a custom non-EC2 assigned hostname, you'll need to configure the kubelet using the If you're still experiencing issues, please let us know. |
Hi @micahhausler ; |
@eviln1 can you post the contents of one of your CSRs that is not getting approved?
|
The request:
The certificate:
Additional info:
|
Ok, so you're attempting to use the signer for a non-node server. Did this work previously for you in 1.11? |
Haven't tried it in 1.11 ;
|
Hello, |
hi @micahhausler met the same problem like eviln1 (not honor Subject Alternative Name in the originating CSR) |
What happened:
Server Certificates being generated every second in the /var/lib/kubelet/pki directory
Example Output:
-rw------- 1 root root 1232 Apr 10 08:23 kubelet-server-2019-04-10-08-23-38.pem
-rw------- 1 root root 1232 Apr 10 08:23 kubelet-server-2019-04-10-08-23-39.pem
-rw------- 1 root root 1232 Apr 10 08:23 kubelet-server-2019-04-10-08-23-40.pem
-rw------- 1 root root 1232 Apr 10 08:23 kubelet-server-2019-04-10-08-23-41.pem
-rw------- 1 root root 1232 Apr 10 08:23 kubelet-server-2019-04-10-08-23-42.pem
-rw------- 1 root root 1232 Apr 10 08:23 kubelet-server-2019-04-10-08-23-43.pem
-rw------- 1 root root 1232 Apr 10 08:23 kubelet-server-2019-04-10-08-23-44.pem
What you expected to happen: Limited number of PEM files.
How to reproduce it (as minimally and precisely as possible):
Launch Worker nodes from EKS Optimized AMI 1.12
Associate them with EKS Cluster
Environment:
The text was updated successfully, but these errors were encountered: