Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

automatic webhook tls generation bug #13361

Open
dukkhadevops opened this issue Nov 21, 2024 · 0 comments
Open

automatic webhook tls generation bug #13361

dukkhadevops opened this issue Nov 21, 2024 · 0 comments
Labels

Comments

@dukkhadevops
Copy link

What is the issue?

When running linkerd check 1 day after install I get an error about the proxy injector webhook certificate not being issued by the trust anchor. Which doesn't make sense to me because I've followed the install steps pretty closely. I had all sorts of issues with cert-manager so I even opted to go around that and just let linkerd manage things by just passing certs via the following parameters

  • identityTrustAnchorsPEM
  • identity.issuer.tls.crtPEM
  • identity.issuer.tls.keyPEM

I've reproduced it probably close to 10 times at this point but I just can't figure out where I've gone wrong.

Also important is that if it's a fresh install/deploy, things work fine. No issues with linkerd check on day 1. Its like the certs get renewed and aren't getting the right certificate somehow? Maybe?

How can it be reproduced?

Starting with the install docs

The helm charts I'm using are below. I've tried some of the latest stable releases as well but had issues with the various linkerd pods coming up for whatever reason so I switched back to edge. I've tried some of the October ones and now the latest one I grabbed yesterday as well but no matter which version I've tried the result is the same

  • "helm_repository_url": "helm.linkerd.io/edge",
  • "helm_chart_path": "linkerd-control-plane",
  • "helm_chart_version": "2024.11.3"
  • "helm_chart_path": "linkerd-crds",
  • "helm_chart_version": "2024.11.3"

Here is how we are pushing things - via an ArgoCD application and passing the helm chart the certificates as parameters. I created them via the linkerd documentation with step commands.

gist link - https://gist.github.com/dukkhadevops/f1fb7ff21ae97e98158831ff474984a2

Logs, error output, etc

When running linkerd check the next day after install I get this error

linkerd-webhooks-and-apisvc-tls × proxy-injector webhook has valid cert cert is not issued by the trust anchor: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "linkerd-proxy-injector.linkerd.svc") see https://linkerd.io/2/checks/#l5d-proxy-injector-webhook-cert-valid for hints

output of linkerd check -o short

linkerd-webhooks-and-apisvc-tls × proxy-injector webhook has valid cert cert is not issued by the trust anchor: x509: certificate signed by unknown authority (possibly because of "x509: invalid signature: parent certificate cannot sign this kind of certificate" while trying to verify candidate authority certificate "linkerd-proxy-injector.linkerd.svc") see https://linkerd.io/2/checks/#l5d-proxy-injector-webhook-cert-valid for hints

Environment

  • kubernetes version = 1.30.4
  • cluster env = AKS
  • linkerd version = edge-24.11.3

Possible solution

No response

Additional context

No response

Would you like to work on fixing this bug?

None

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant