As a vSphere administrator, you can replace the certificate for the virtual IP address (VIP) to securely connect to the Supervisor Cluster API endpoint with a certificate signed by a CA that your hosts already trust. The certificate authenticates the Kubernetes control plane to DevOps engineers, both during login and subsequent interactions with the Supervisor Cluster.
Prerequisites
Verify that you have access to a CA that can sign CSRs. For DevOps engineers, the CA must be installed on their system as a trusted root.
Note: In vSphere 7.x, x509 certificate chains are not supported with the L4 load balancer endpoint used for the Kubernetes API server. Certificate chains that involve intermediate CAs (for example, if you bring your own CA chain) might experience certificate verification errors.
Procedure
- In the vSphere Client, navigate to the Supervisor Cluster.
- Click Configure then under Namespaces select Certificates.
- In the Workload platform MTG pane, select .
- Provide the details for the certificate.
Note: If you use an identity provider service, you must also include the entire certificate chain. The chain is not required for standard HTTPS traffic, however.
- Once the CSR is generated, click Copy.
- Sign the certificate with a CA.
- From the Workload platform MTG pane, select .
- Upload the signed certificate file and click Replace Certificate.
- Validate the certificate on the IP address of the Kubernetes control plane.
For example, you can open the
Kubernetes CLI Tools for vSphere download page and confirm that the certificate is replaced successfully by using the browser. On a Linux or Unix system you can also use
echo | openssl s_client -connect https://ip:6443
.