SSL cert not containing API VIP URL as SAN for new vSphere IPI deployments #1158
stolencode
started this conversation in
General
Replies: 1 comment 2 replies
-
By chance, is there anything(such as a load balancer) between where you are seeing this error and the API VIP? It almost looks like the SNI tag for the public API is being stripped before the connection reaches the VIP. The API server can return different certs based on the SNI tag. |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
on a new vSphere IPI deployment of OKD, tested on the latest 4.10.x build as well as the previous two 4.9.x builds, I'm getting the following error:
x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, 172.30.0.1, not api.okd.cudanet.org
The kubernetes api is up and listening, and inspecting the cert does show that it is valid for the SANs mentioned above, but not for the URL I specified for the API VIP. I tested this out from a Linux host and a mac, same behavior. My Openshift 4.10.3 cluster has no such problem. Grasping at straws, I double and triple checked that the root CA and vSphere trusted root cert are installed (they are, otherwise Openshift wouldn't work either and I'd get a different SSL error).
Beta Was this translation helpful? Give feedback.
All reactions