Cert-Manager Audit
In Expired Certificates: Incident Review, I listed a future action: “Audit the cluster to see if there are any other TLS secrets that aren’t using cert-manager.” Here’s how I did it using Elixir Livebook.
In Expired Certificates: Incident Review, I listed a future action: “Audit the cluster to see if there are any other TLS secrets that aren’t using cert-manager.” Here’s how I did it using Elixir Livebook.
In this post, I showed how to use
an init container to create CertificateRequest
objects, which cert-manager signs, returning the certificates. A new
request is created every time a pod starts. This eventually leaves a lot of stale CertificateRequest
objects. We
should clean those up.
In a previous post, I used sleep
5s
to wait for cert-manager to complete the CertificateRequest
. Instead, we should poll the status
field.
In an earlier post, I used a
ClusterIssuer
that I originally created when first setting up cert-manager. That needs fixing.
In the previous post we used OpenSSL to create a certificate signing request. In this post, we’ll submit it to cert-manager and get the certificate back.
I want to set up an Erlang cluster in Kubernetes, using TLS with mutual authentication. This post discusses some of the potential options for doing that. It’s also applicable to general mutual TLS between pods.
Up to this point, I’ve been creating and installing certificates manually. Let’s see if cert-manager will make that easier.