This is a cache of https://docs.openshift.com/container-platform/4.4/backup_and_restore/disaster_recovery/scenario-3-expired-certs.html. It is a snapshot of the page at 2024-11-23T01:28:09.630+0000.
Recovering from expired control plane <strong>certificate</strong>s - Disaster recovery | Backup and restore | OpenShift Container Platform 4.4
×

Recovering from expired control plane certificates

As of OpenShift Container Platform 4.4.8, the cluster can automatically recover from expired control plane certificates. You no longer need to perform the manual steps that were required in previous versions.

The exception is that you must manually approve the pending node-bootstrapper certificate signing requests (CSRs) to recover kubelet certificates.

Use the following steps to approve the pending node-bootstrapper CSRs.

Procedure
  1. Get the list of current CSRs:

    $ oc get csr
  2. Review the details of a CSR to verify that it is valid:

    $ oc describe csr <csr_name> (1)
    1 <csr_name> is the name of a CSR from the list of current CSRs.
  3. Approve each valid node-bootstrapper CSR:

    $ oc adm certificate approve <csr_name>