TLS
Understand how to secure your Kubernetes cluster with TLS.
Transport Layer Security (TLS) Basics
The concept is very similar to public and private keys, where the public key in used to encrypt the data and the private key is used to decrypt the data.
Transport Layer Security (TLS) certificate also known as Secure Sockets Layer (SSL) certificate, mainly to secure internet connections by encrypting data sent between browser and server.
Generate a private key
Generate a public key based on private key
Now, the above commands will generate a self-signed certificate. This certificate is not trusted by browsers, so you need to get a certificate from a trusted Certificate Authority (CA). CA are companies that are trusted to sign, validate, and issue certificates. For example, GlobalSign, DigiCert, GoDaddy, etc.
In this case, we will generate a Certificate Signing Request (CSR) using the private key and with the domain name.
- more details on this command can be found here
- generate a certifate signing request using openssl here
So, this sample.csr
file will be sent to the CA to verify, validate, and sign the certificate. The CA will then send back the signed certificate that the browser will trust. Remember, CAs themselves have a set of public and private keys to sign the certificate.
- private key = sign the certificate
- public key = verify and validate the certificate. These public keys from the CA are already installed in the browser.
Public key | Private Key |
---|---|
*.crt , *.pem | *.key , *-key.pem |
Glossary:
- CA: Certificate Authority
- CSR: Certificate Signing Request
- CRT: Certificate
- PEM: Privacy Enhanced Mail, it can contain various types of data, including certificates, private keys, and other related information. PEM files are encoded in Base64 and typically include headers and footers to indicate the type of data they contain. The most common types of data found in PEM files are
- Certificates: These can be in the form of X.509 certificates, which are used in SSL/TLS for securing communications.
- Private Keys: These are the private keys associated with the certificates, used for decryption and signing.
- Certificate Chains: These include the certificate along with intermediate and root certificates to establish a chain of trust.
- Public Keys: These are the public keys associated with the private keys, used for encryption and verifying signatures.
- KEY: Private key
TLS in Kubernetes
In Kubernetes, the communication between all the Kubernetes components must be secure and encrypted. This is where TLS comes into play. For example, no matter the admin is using kubectl or Kubernetes API directly, the communication must be secure.
So, we have server and client certificates. The server certificate is used secure communication between the Kubernetes components, for example, kube-apiserver, kubelet, etcd, where the client certificate is used to authenticate users and applications that are trying to interact with the Kubernetes cluster and to verify who they are.
Remember, when we create these certificates, we need to sign them with a CA. In fact, Kubernetes requires you to have at least one certificate authority to sign all the certificates, but you can have multiple CAs configured in your cluster.
Certificates
Server certificates
We actually got 3 parties here:
-
kube-apiserver
- This is the main component in Kubernetes, so it is a server. Therefore it needs a server certificate to secure the communication betweeh the client and the server (authenticate their clients).
- For example, you can create
kube-apiserver.crt
andkube-apiserver.key
files. Remember, you can put any file name you want.
-
etcd
- This is the database that will store all the Kubernetes cluster data. So it is a server.
- For example, you can create
etcd.crt
andetcd.key
files.
-
kubelet
- This is the agent that runs on each node and they will expose an HTTPS API endpoint that the kube-apiserver will talk to in the Kubernetes cluster. So it is a server.
- For example, you can create
kubelet.crt
andkubelet.key
files.
Client certificates
For the clients parties to access the services, we have:
-
The clients who access the kube-apiserver. The client needs a client certificate to authenticate themselves to the kube-apiserver.
- kube-scheduler
- For example,
kube-scheduler.crt
andkube-scheduler.key
.
- For example,
- kube-controller-manager
- For example,
kube-controller-manager.crt
andkube-controller-manager.key
.
- For example,
- kube-proxy
- For example,
kube-proxy.crt
andkube-proxy.key
.
- For example,
- Admin who uses kubectl or Kubernetes API directly
- For example,
admin.crt
andadmin.key
.
- For example,
- kube-scheduler
-
The clients who access the etcd or kubelet. The client needs a client certificate to authenticate themselves to the etcd or kubelet.
- kube-apiserver
- You can use back the
kube-apiserver.crt
andkube-apiserver.key
files, or you want to create a new one also can. The same goes for the kubelet.
- You can use back the
- kube-apiserver
Manually create certificates
You can use any tools like OpenSSL, Easy-RSA, etc to create the certificates.
Step 1: Generate CA certificate
- With all the above commands, the CA has its own private key and root** certificate file**.
Step 2: Generate clients certificate
Let's say we want to create a client certificate for the admin user. You just need to repeat the same steps for other clients that need certificates to access the kube-apiserver.
- Remember to sign the certificate using the CA certificate and key, so the cluster will trust the certificate.
- The
admin.crt
will be used by the admin to authenticate themselves to the server.
Now assuming you create a new user called john, how do you differentiate betweeh the admin and john users, as admin user is mainly do the administrators job while john user is a normal user. Well, in this case, you have to mention the group details in the processing of generating CSR.
- The
system:masters
group name already exists in the Kubernetes cluster with admin privileges. - The
system:masters
is the group name that the admin user belongs to. So, the admin user will have the admin privileges.
kubelet
For kubelet client certificates, actually got a bit different from the other clients. The certificates naming and formats starts with the system:node:<node-name>
. This is because kubelet is running on each node, and nodes are system components like kube-scheduler. With this format, the kube-apiserver knows which node is authenticating and give the right permissions based on this format.
You might have a question? How the kube-apiserver give the right permissions based on the format. Well, actually nodes must be added to a group called system:nodes
in the Kubernetes cluster. This group is predefined in the Kubernetes cluster and has the right permissions to access the kubelet.
After the certificates are generated, remember to configure them in kubeconfig files.
Test the certificate
Actually, there are multiple ways to test the connections.
One way is to use the curl
command to test the connection.
The other way is to move all these configurations to the kube-config.yaml
file and use the kubectl
command to test the connection. This method is more common and easier to manage.
Now, remember, all the clients and servers need to have the CA's root certificate to trust the certificates. So, you need to distribute, copy, and specify the CA's root certificate to all the Kubernetes components, clients, and servers when you configure them.
Step 3: Generate servers certificate
The steps of creating a server certificate are similar to creating a client certificate. The only difference is that we want to ensure those servers like kube-apiserver, etcd, and kubelet are high available and secure by deploying them in multiple servers. So, to secure the communication between the servers, we will need to generate additional peer certificates.
- each peer will have its own certificate and private key.
etcd
- Remember to specify the CA root certificate as well.
kube-apiserver
We know that every operation in the Kubernetes cluster is done through the kube-apiserver. So this component may have many names and aliases within the cluster. Here is the list of names and aliases that the kube-apiserver may have:
- kubernetes
- kubernetes.default
- kubernetes.default.svc
- kubernetes.default.svc.cluster.local
- ip address of the server like 10.89.0.2
When we have these names available, we have configure these names and aliases in the certificate, so that any clients or users can use these names and aliases to access the kube-apiserver.
In this case, we have to create a configuration file to specify the aliases and names.
kubelet
Assuming you have multiple worker nodes, you will need to generate a certificate for each worker node, but how do you name the certificates? Well, actually they will be named after the node name. Once the certificates are generated, configure them kubelet YAML configuration file.
Certificate details
Before we understand the certificate details, we need to understand how the Kubernetes cluster was setup. There are multiple ways to setup the Kubernetes cluster, each way has its own method to generate and manage the certificates. In this case we are looking at the common practice that people will do: Deploy Kubernetes components as pods.
Let's take a look at the kube-apiserver pod.
Take a look at /etc/kubernetes/pki/apiserver.crt
.
Issuer: CN = kubernetes
= Issuer of the certificateNot After : Jan 5 06:16:55 2026 GMT
= Expiry date of the certificateSubject: CN = kube-apiserver
= Common name of the certificateX509v3 Subject Alternative Name
= Alias names of the certificate
If you want to debug the certificate, then you can use kubectl logs
command to see the logs of the pod, if the kubectl
unable to work properly, then you can use the docker logs
command to see the logs of the container and troubleshoot.