As a vSphere administrator, you can replace the certificate for the virtual IP address (VIP) to securely connect to the Supervisor API endpoint with a certificate signed by a CA that your hosts already trust. The certificate authenticates the Kubernetes control plane to DevOps engineers, both during login and subsequent interactions with the Supervisor.
Prerequisites
Verify that you have access to a CA that can sign CSRs. For DevOps engineers, the CA must be installed on their system as a trusted root.
In the vSphere Client, navigate to Workload Management.
Select Supervisors and the select the Supervisor from the list.
Click Configure and select Certificates.
In the Workload Management Platform pane, select Actions > Generate CSR.
Provide the details for the certificate.
Note: If you use an identity provider service, you must also include the entire certificate chain. The chain is not required for standard HTTPS traffic, however.
Once the CSR is generated, click Copy.
Sign the certificate with a CA.
From the Workload Platform Management pane, select Actions > Replace Certificate.
Upload the signed certificate file and click Replace Certificate.
Validate the certificate on the IP address of the Kubernetes control plane.
For example, you can open the
Kubernetes CLI Tools for vSphere download page and confirm that the certificate is replaced successfully by using the browser. On a Linux or Unix system you can also use
echo | openssl s_client -connect https://ip:6443.