You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
When executing k3s certificate check --output table we get a useful output to learn about the certificate expiration date. For example:
CERTIFICATE SUBJECT STATUS EXPIRES
----------- ------- ------ -------
client-kube-proxy.crt CN=system:kube-proxy OK 2026-04-02T13:22:31Z
client-kube-proxy.crt CN=k3s-client-ca@1743600133 OK 2035-03-31T13:22:13Z
client-kubelet.crt CN=system:node:vm1,O=system:nodes OK 2026-04-02T13:22:31Z
client-kubelet.crt CN=k3s-client-ca@1743600133 OK 2035-03-31T13:22:13Z
serving-kubelet.crt CN=vm1 OK 2026-04-02T13:22:31Z
serving-kubelet.crt CN=k3s-server-ca@1743600133 OK 2035-03-31T13:22:13Z
client-k3s-controller.crt CN=system:k3s-controller OK 2026-04-02T13:22:31Z
client-k3s-controller.crt CN=k3s-client-ca@1743600133 OK 2035-03-31T13:22:13Z
However, that output could be confusing because:
The same certificate file is shown twice. One time pointing at the certificate and the other time pointing at the CA
The same CA certificate is shown in different lines
In theory, "subject" is the entity that the certificate is issued to, not the CA. In this output we use a column "subject" for both
Describe the solution you'd like
I would like to see an output where subject certificates and CA certificates are separated in two sections and there is a column that links the subject certificate to each CA. For example, kubeadm certs check-expiration is a good example:
CERTIFICATE EXPIRES RESIDUAL TIME CERTIFICATE AUTHORITY EXTERNALLY MANAGED
apiserver Aug 16, 2024 10:00 UTC 364d ca no
apiserver-etcd-client Aug 16, 2024 10:00 UTC 364d etcd-ca no
apiserver-kubelet-client Aug 16, 2024 10:00 UTC 364d ca no
etcd-healthcheck-client Aug 16, 2024 10:00 UTC 364d etcd-ca no
etcd-peer Aug 16, 2024 10:00 UTC 364d etcd-ca no
etcd-server Aug 16, 2024 10:00 UTC 364d etcd-ca no
front-proxy-client Aug 16, 2024 10:00 UTC 364d front-proxy-ca no
CERTIFICATE AUTHORITY EXPIRES RESIDUAL TIME EXTERNALLY MANAGED
ca Aug 13, 2033 10:00 UTC 9y no
etcd-ca Aug 13, 2033 10:00 UTC 9y no
front-proxy-ca Aug 13, 2033 10:00 UTC 9y no
Describe alternatives you've considered
Additional context
The text was updated successfully, but these errors were encountered:
Is your feature request related to a problem? Please describe.
When executing
k3s certificate check --output table
we get a useful output to learn about the certificate expiration date. For example:However, that output could be confusing because:
Describe the solution you'd like
I would like to see an output where subject certificates and CA certificates are separated in two sections and there is a column that links the subject certificate to each CA. For example,
kubeadm certs check-expiration
is a good example:Describe alternatives you've considered
Additional context
The text was updated successfully, but these errors were encountered: