vrutkovs@redhat.com okay, thank you !! But would like to understand what all should be a owning component of kube-apiserer vs kube-scheduler ? can you help me explain ? thanks !! Below is the output i see for kube-scheduler and kcm
kube-scheduler:
=============
[knarra@knarra ~]$ oc get secret -A -o json | jq -r ' .items[] | select( .metadata.annotations."auth.openshift.io/certificate-not-after" | .!=null and fromdateiso8601<='$( date --date='+10year' +%s )') | "expiration: ( .metadata.annotations."auth.openshift.io/certificate-not-after" ) cert-owning: ( .metadata.annotations."openshift.io/owning-component" ) ( .type ) -n ( .metadata.namespace ) ( .metadata.name )" ' | sort | column -t | grep "kube-scheduler"
expiration: 2023-12-12T20:42:23Z cert-owning: kube-apiserver kubernetes.io/tls -n openshift-config-managed kube-scheduler-client-cert-key
expiration: 2023-12-12T20:42:23Z cert-owning: kube-apiserver kubernetes.io/tls -n openshift-kube-scheduler kube-scheduler-client-cert-key
KCM:
===================
[knarra@knarra ~]$ oc get secret -A -o json | jq -r ' .items[] | select( .metadata.annotations."auth.openshift.io/certificate-not-after" | .!=null and fromdateiso8601<='$( date --date='+10year' +%s )') | "expiration: ( .metadata.annotations."auth.openshift.io/certificate-not-after" ) cert-owning: ( .metadata.annotations."openshift.io/owning-component" ) ( .type ) -n ( .metadata.namespace ) ( .metadata.name )" ' | sort | column -t | grep "kube-controller-manager"
expiration: 2023-12-12T20:42:16Z cert-owning: kube-apiserver kubernetes.io/tls -n openshift-config-managed kube-controller-manager-client-cert-key
expiration: 2023-12-12T20:42:16Z cert-owning: kube-apiserver kubernetes.io/tls -n openshift-kube-controller-manager kube-controller-manager-client-cert-key
expiration: 2023-12-13T08:28:07Z cert-owning: kube-controller-manager kubernetes.io/tls -n openshift-kube-controller-manager csr-signer
expiration: 2023-12-13T08:28:07Z cert-owning: kube-controller-manager kubernetes.io/tls -n openshift-kube-controller-manager-operator csr-signer
expiration: 2023-12-13T08:28:07Z cert-owning: kube-controller-manager kubernetes.io/tls -n openshift-kube-controller-manager-operator csr-signer-signer
Since the problem described in this issue should be resolved in a recent advisory, it has been closed.
For information on the advisory (Critical: OpenShift Container Platform 4.15.0 bug fix and security update), and where to find the updated files, follow the link below.
If the solution does not work for you, open a new bug report.
https://access.redhat.com/errata/RHSA-2023:7198