kubernetes: ECDSA not supported for CA
Hi,
I tried to do this PKI configuration and didn’t worked until I switch CA cert algorithm to RSA.
- This doesn’t work:
Root CA: ECDSA-521
Intermediate CA: ECDSA-521
API Server Certificate: RSA-2048
- This works instead:
Root CA: RSA-4096
Intermediate CA: RSA-4096
API Server Certificate: RSA-2048
Is ECDSA unsupported?
Thanks,
About this issue
- Original URL
- State: closed
- Created 8 years ago
- Comments: 15 (7 by maintainers)
deleting the stale service account tokens and letting the controller manager regenerate them should be sufficient. If you don’t have other secrets you care about, you can do a blanket delete of ALL secrets (
kubectl delete secrets --all-namespaces
).If you do have other secrets you want to preserve, you’ll likely need to do a fieldSelector of “type=kubernetes.io/service-account-token” to limit which secrets you want to delete.