This message was deleted.
# rke2
a
This message was deleted.
c
These look like Rancher questions, not rke2. As far as rke2 is concerned rancher is just another app deployed to the cluster. You might share a link to your comment in the #C3ASABBD1 channel. I am confused though, as it is really not clear what CAs you created and where and whether it was for rke2 or rancher.
a
Before creating the cluster mentioned above, i tested update the selfsigned rancher cert, rancher cert was successfully updated. After that, I updated CATTLE_CA_CHECKSUM in rke2 cluster, following rancher guides and not works, the cluster stucks in updating. today i think i can confirm is because rancher agent couldn't connect to rancher to finish the process (i have a pending ticket to test and confirm this) That's why I made the certificate valid for 20 years. Yesterday i found in the docker container of rancher (after 60 days of correct working), that the mounted CA was no the correct (i dont know why) december 27: • generated the 20y cert with openssl • created the rancher server with docker mounting generated cert, key and ca, (ca = cert) • created rke2 cluster february 25 • some alerts about not healty pods february 26 • found logs in cattle-cluster-agent pods and rancher-system-agent service about expired ca (exactly 60 days after creation) yesterday • replaced ca and restarted rancher server • updated ca_checksum in master nodes, this allow cluster access but nodes in "Cluster Management" stucks in updating(master) and one in error(worker) today • replaced
certificate-authority-data
in all nodes file
/var/lib/rancher/agent/rancher2_connection_info.json
, no more logs about • i dont know why ca.pem was different in rancher server (the exactly 60 days cert makes me think is a rancher behavior, but is speculation) • i need to test if updating ca in json file, allow to update self signed cert I hope this clarifies for you
c
We don’t technically support using the rancher/rancher docker container standalone. It is really just for very lightweight dev or proof-of-concept use. For any production env you must deploy Rancher to a Kubernetes cluster using the helm chart.
a
Yep, i know is not supported officially, but not my decision. I found the bug,
Copy code
docker run -v $PWD/cert:/certs \
  -e SSL_SUBJECT=rancherfqdn \
  -e SSL_DNS=rancherfqdn \
  -e SSL_IP=10.0.0.1 -e SSL_EXPIRE=3650 -e CA_SUBJECT=subject \
  superseb/omgwtfssl
the cert was generated with this command, the ca generated, not respect the SSL_EXPIRE variable, only the cert has the correct expire date
In the next days i will try updating the selfsigned cert adding the steps mentioned above, if works i will report 👍
c
Sebastiaan is also no longer with SUSE so that ssl helper image also isn’t really safe to rely on. I don’t think he’d go and delete it but it’s definitely not maintained. As a matter of fact I think that image is just a 7 year old one-time build of a fork of another project.
you’ve got a lot of stuff going on here that is setting you up for a very difficult to support environment.
a
good to know about seb, thanks for the help @creamy-pencil-82913 👍
About the reported situation, i can close it, now i understand what happened
@creamy-pencil-82913 Hi, I can confirm that when you update a self-signed certificate, you also need to update the CA in
/var/lib/rancher/agent/rancher2_connection_info.json
(because the certificate itself acts as the CA). For private certificates, the CA typically expires in 10-20 years, which might become a problem in the future. Does this warrant opening a ticket?