docs/adrs/cert-expiry-checks.md
Date: 2024-03-26
Accepted
The certificates generated by K3s have two lifecycles:
K3s does not currently expose any information about certificate validity. There are no metrics, CLI tools, or events that an administrator can use to track when certificates must be renewed or rotated to avoid outages when certificates expire. The best we can do at the moment is recommend that administrators either restart their nodes regularly to ensure that certificates are renewed within the 90 day window, or manually rotate their certs yearly.
We do not have any guidance around renewing the CA certs, which will be a major undertaking for users as their clusters approach the 10-year mark. We currently have a bit of runway on this issue, as K3s has not been around for 10 years.
k3s certificate rotate).This will require additional documentation, CLI subcommands, and QA work to validate the process steps.