Back to all scenarios
Scenario #293
Security
Kubernetes v1.21, Kubeadm-based cluster
Stale Node Certificates After Rejoining Cluster
A node was rejoined to the cluster using a stale certificate, giving it access it shouldn't have.
Find this helpful?
What Happened
A node that was previously removed was added back using an old /var/lib/kubelet/pki/kubelet-client.crt, which was still valid.
Diagnosis Steps
- 1Compared certificate expiry and usage.
- 2Found stale kubelet cert on rejoined node.
- 3Verified node had been deleted previously.
Root Cause
Old credentials not purged before node rejoin.
Fix/Workaround
• Manually deleted old certificates from the node.
• Set short TTLs for client certificates.
Lessons Learned
Node certs should be one-time-use and short-lived.
How to Avoid
- 1Rotate node credentials regularly.
- 2Use automation to purge sensitive files before rejoining.