Chapter 3. Internal certificate authority rotation for RHACS
Certificate authority (CA) rotation is important in Red Hat Advanced Cluster Security for Kubernetes (RHACS) to ensure that Central and secured clusters can communicate. RHACS includes an internal CA that is valid for 5 years. Central and secured cluster service certificates depend on this CA. If the CA expires, RHACS stops working.
Previously, if the internal CA expired, you had to delete the central-tls secret and manually re-register all the secured clusters. Starting with RHACS 4.9, the Operator manages CA rotation. Central simultaneously trusts two CAs, enabling overlap and providing a smoother migration.
3.1. CA rotation support for different installation methods Copy linkLink copied to clipboard!
The following table shows the level of certificate authority (CA) rotation support based on the installation method you use for Central and secured clusters:
| Component | Installation method | CA rotation support | Notes |
|---|---|---|---|
| Central | Operator-installed | Full support | Migration is fully automated. |
| Central | Helm or manifest | Not supported | Use the Operator for automatic CA rotation. |
| Secured cluster | Operator-installed | Full support | Migration is fully automated if the connected Central instance is also Operator-installed. |
| Secured cluster | Helm or manifest | Partial support | Connect to Central that has rotated its CA, but cannot rotate its own service certificates to the new CA. Manual re-registration is required before the old CA expires. |
3.2. Preparing for deployments and upgrades Copy linkLink copied to clipboard!
The following table lists the actions you must take for each deployment scenario during certificate authority (CA) rotation or upgrades:
| Deployment scenario | What you must do |
|---|---|
| Operator-managed secured clusters | No action is needed if Central is also Operator-managed. The Operator automates rotation. |
| Helm-managed secured clusters | Remove the cluster and re-register it with a new cluster registration secret (CRS) or init bundle before the 5-year CA expires. Follow these steps:
|
| Upgrading a Central instance older than 4 years to Red Hat Advanced Cluster Security for Kubernetes (RHACS) 4.9 | Note Central switches to certificates signed by the new CA and secured clusters older than version 4.9 cannot trust the certificates. You can do any of the following tasks:
Secured clusters for RHACS 4.9 and later versions automatically trust the new CA if the old CA is still valid. |