swarm: call out CA rotation as potentially dangerous with MKE

Signed-off-by: Bjorn Neergaard <bneergaard@mirantis.com>
This commit is contained in:
Bjorn Neergaard 2023-01-25 16:21:35 -07:00
parent 2ff8014595
commit c35d70d5e8
No known key found for this signature in database
1 changed files with 7 additions and 0 deletions

View File

@ -60,6 +60,13 @@ reference for details.
## Rotating the CA certificate ## Rotating the CA certificate
> **Note**
>
> Mirantis Kubernetes Engine (MKE), formerly known as Docker UCP, provides an external
> certificate manager service for the swarm. If you run swarm on MKE, you shouldn't
> rotate the CA certificates manually. Instead, contact Mirantis support if you need
> to rotate a certificate.
In the event that a cluster CA key or a manager node is compromised, you can In the event that a cluster CA key or a manager node is compromised, you can
rotate the swarm root CA so that none of the nodes trust certificates rotate the swarm root CA so that none of the nodes trust certificates
signed by the old root CA anymore. signed by the old root CA anymore.