This message was deleted.
# k3s
a
This message was deleted.
c
This has nothing to do with TLS SANs. The certificate on your LB isn't trusted. Turn off TLS offload on your external LB, you need to pass through TLS to the nodes themselves.
Make it a l3 lb instead of a l7 lb.
m
thanks! I imagined that would work, but sadly I'm facing issues with the l3 Load balancing on GCP, weird behavior there
what I don't understand is, why / how the TLS certs in the nodes are trusted? I thought that during the bootstrap process with "short" token the initial connection is assumed safe
I'm using this to bootstrap:
Copy code
curl -sfL <https://get.k3s.io> | sh -s - server \
--token=SECRET \
--write-kubeconfig-mode 664 \
--tls-san=$LB_IP \
--node-ip=$SELF_IP \
--cluster-init
and this to join:
Copy code
curl -sfL <https://get.k3s.io> | sh -xs - server \
--token=SECRET \
--write-kubeconfig-mode 664 \
--tls-san=$LB_IP \
--node-ip=$SELF_IP \
--server https://$LB_IP:6443 \
I've also tried to pick the certificates from my first server and use them for the LB but without success
c
Even if you don’t use a secure token, it uses the LB connection to download the cluster CA cert bundle, and then validates the LB cert with that.