Back to all scenarios
Scenario #28
Cluster Management
K8s v1.19, kubeadm cluster
kubelet Fails to Start Due to Expired TLS Certs
Several nodes went NotReady after reboot due to kubelet failing to start with expired client certs.
Find this helpful?
What Happened
Kubelet uses a client certificate for authentication with the API server. These are typically auto-rotated, but the nodes were offline when the rotation was due.
Diagnosis Steps
- 1journalctl -u kubelet – cert expired error.
- 2/var/lib/kubelet/pki/kubelet-client-current.pem – expired date.
Root Cause
Kubelet cert rotation missed due to node downtime.
Fix/Workaround
• Regenerated kubelet certs using kubeadm.
bash
CopyEdit
kubeadm certs renew all
Lessons Learned
Cert rotation has a dependency on uptime.
How to Avoid
- 1Monitor cert expiry proactively.
- 2Rotate certs manually before planned outages.