doc: Number subsections that are procedural steps

This commit is contained in:
John Gardiner Myers 2021-10-30 09:50:51 -07:00
parent 56b8ea2afc
commit 0f99aa1e62
1 changed files with 11 additions and 11 deletions

View File

@ -26,7 +26,7 @@ or are "service-account" by performing the following procedure. Other keypairs w
automatically reissued by a non-dryrun `kops update cluster` when their issuing automatically reissued by a non-dryrun `kops update cluster` when their issuing
CA is rotated. CA is rotated.
### Create and stage new keypair ### 1. Create and stage new keypair
Create a new keypair for each keyset that you are going to rotate. Create a new keypair for each keyset that you are going to rotate.
Then update the cluster and perform a rolling update. Then update the cluster and perform a rolling update.
@ -47,7 +47,7 @@ A failure at this stage is unlikely. To roll back this change:
* Then use `kops update cluster --yes` * Then use `kops update cluster --yes`
* Then use `kops rolling-update cluster --yes` * Then use `kops rolling-update cluster --yes`
### Export and distribute new kubeconfig certificate-authority-data ### 2. Export and distribute new kubeconfig certificate-authority-data
If you are rotating the Kubernetes general CA ("kubernetes-ca" or "all") and If you are rotating the Kubernetes general CA ("kubernetes-ca" or "all") and
you are not using a load balancer for the Kubernetes API with its own separate you are not using a load balancer for the Kubernetes API with its own separate
@ -65,7 +65,7 @@ Kubernetes API.
To roll back this change, distribute the previous kubeconfig `certificate-authority-data`. To roll back this change, distribute the previous kubeconfig `certificate-authority-data`.
### Promote the new keypairs ### 3. Promote the new keypairs
Promote the new keypairs to primary with: Promote the new keypairs to primary with:
@ -96,7 +96,7 @@ To roll back this change:
* Then use `kops update cluster --yes` * Then use `kops update cluster --yes`
* Then use `kops rolling-update cluster --yes` * Then use `kops rolling-update cluster --yes`
### Export and distribute new kubeconfig admin credentials ### 4. Export and distribute new kubeconfig admin credentials
If you are rotating the Kubernetes general CA ("kubernetes-ca" or "all") and If you are rotating the Kubernetes general CA ("kubernetes-ca" or "all") and
have kubeconfigs with cluster admin credentials, export new kubeconfigs have kubeconfigs with cluster admin credentials, export new kubeconfigs
@ -114,7 +114,7 @@ Distribute the new credentials to all clients that require them.
To roll back this change, distribute the previous kubeconfig admin credentials. To roll back this change, distribute the previous kubeconfig admin credentials.
### Distrust the previous keypairs ### 5. Distrust the previous keypairs
Remove trust in the previous keypairs with: Remove trust in the previous keypairs with:
@ -137,7 +137,7 @@ To roll back this change:
* Then use `kops update cluster --yes` * Then use `kops update cluster --yes`
* Then use `kops rolling-update cluster --force --yes` * Then use `kops rolling-update cluster --force --yes`
### Export and distribute new kubeconfig certificate-authority-data ### 6. Export and distribute new kubeconfig certificate-authority-data
If you are rotating the Kubernetes general CA ("kubernetes-ca" or "all") and If you are rotating the Kubernetes general CA ("kubernetes-ca" or "all") and
you are not using a load balancer for the Kubernetes API with its own separate you are not using a load balancer for the Kubernetes API with its own separate
@ -192,7 +192,7 @@ prior to 1.22.
**This is a disruptive procedure.** **This is a disruptive procedure.**
### Delete all secrets ### 1. Delete all secrets
Delete all secrets & keypairs that kOps is holding: Delete all secrets & keypairs that kOps is holding:
@ -202,7 +202,7 @@ kops get secrets | grep '^Secret' | awk '{print $2}' | xargs -I {} kops delete
kops get secrets | grep '^Keypair' | awk '{print $2}' | xargs -I {} kops delete secret keypair {} kops get secrets | grep '^Keypair' | awk '{print $2}' | xargs -I {} kops delete secret keypair {}
``` ```
### Recreate all secrets ### 2. Recreate all secrets
Now run `kops update` to regenerate the secrets & keypairs. Now run `kops update` to regenerate the secrets & keypairs.
``` ```
@ -212,7 +212,7 @@ kops update cluster --yes
kOps may fail to recreate all the keys on first try. If you get errors about ca key for 'ca' not being found, run `kops update cluster --yes` once more. kOps may fail to recreate all the keys on first try. If you get errors about ca key for 'ca' not being found, run `kops update cluster --yes` once more.
### Force cluster to use new secrets ### 3. Force cluster to use new secrets
Now you will have to remove the etcd certificates from every master. Now you will have to remove the etcd certificates from every master.
@ -241,7 +241,7 @@ Re-export kubecfg with new settings:
kops export kubecfg kops export kubecfg
``` ```
### Recreate all service accounts ### 4. Recreate all service accounts
Now the service account tokens will need to be regenerated inside the cluster: Now the service account tokens will need to be regenerated inside the cluster:
@ -262,7 +262,7 @@ pkill -f kube-controller-manager
kubectl delete pods --all --all-namespaces kubectl delete pods --all --all-namespaces
``` ```
### Verify the cluster is back up ### 5. Verify the cluster is back up
The last command from the previous section will take some time. Meanwhile you can check validation to see the cluster gradually coming back online. The last command from the previous section will take some time. Meanwhile you can check validation to see the cluster gradually coming back online.