swarm: call out CA rotation as potentially dangerous with MKE

Signed-off-by: Bjorn Neergaard <bneergaard@mirantis.com>
This commit is contained in:
Bjorn Neergaard 2023-01-25 16:21:35 -07:00
parent 2ff8014595
commit c35d70d5e8
No known key found for this signature in database
1 changed files with 7 additions and 0 deletions

View File

@ -60,6 +60,13 @@ reference for details.
## Rotating the CA certificate
> **Note**
>
> Mirantis Kubernetes Engine (MKE), formerly known as Docker UCP, provides an external
> certificate manager service for the swarm. If you run swarm on MKE, you shouldn't
> rotate the CA certificates manually. Instead, contact Mirantis support if you need
> to rotate a certificate.
In the event that a cluster CA key or a manager node is compromised, you can
rotate the swarm root CA so that none of the nodes trust certificates
signed by the old root CA anymore.