-
Notifications
You must be signed in to change notification settings - Fork 3.4k
AZ AKS Needs to support Larger CAs #32000
Copy link
Copy link
Closed
Labels
AKSaz aks/acs/openshiftaz aks/acs/openshiftAuto-AssignAuto assign by botAuto assign by botService AttentionThis issue is responsible by Azure service team.This issue is responsible by Azure service team.bugThis issue requires a change to an existing behavior in the product in order to be resolved.This issue requires a change to an existing behavior in the product in order to be resolved.customer-reportedIssues that are reported by GitHub users external to the Azure organization.Issues that are reported by GitHub users external to the Azure organization.
Metadata
Metadata
Assignees
Labels
AKSaz aks/acs/openshiftaz aks/acs/openshiftAuto-AssignAuto assign by botAuto assign by botService AttentionThis issue is responsible by Azure service team.This issue is responsible by Azure service team.bugThis issue requires a change to an existing behavior in the product in order to be resolved.This issue requires a change to an existing behavior in the product in order to be resolved.customer-reportedIssues that are reported by GitHub users external to the Azure organization.Issues that are reported by GitHub users external to the Azure organization.
Describe the bug
Sending request in here based on a Support Ticket exchange in the Azure US Government
We are trying to add our Internal Certificate Authority to AKS and, the command fails because we have too many certificates.
As you can tell, our Certificate Authority is very large and we have requirements to connect to different websites that are terminated with the public CA. There are, in fact 49 Certificates inside this file.
Related command
az aks update -g $NAME_OF_RG -n $NAME_OF_CLUSTER --custom-ca-trust-certificates $LARGE_CA_CRTErrors
Only up to 10 new-line separated CAs can be passed, got 49 instead.
Issue script & Debug output
Can't reproduce here
Expected behavior
We expect the cluster to update with all of our certificates.
Environment Summary
Your CLI is up-to-date.
Additional context
I would prefer to sideload all of the CAs so that we do not have to start manually downloading certs from a different website.