You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You can monitor CertificateSigningRequests (CSR) by running:
28
28
29
29
```bash
30
30
kubectl get certificatesigningrequest -w
31
31
```
32
32
33
+
Monitoring CSRs is useful for debugging certificates used for Calico Node and Typha mutual TLS (mTLS) communication. The automatic CSR approval and signing flow can fail in several ways. For example:
34
+
35
+
- The CSR request might not be created or submitted correctly.
36
+
- The Tigera Operator CSR controller might not process it.
37
+
- The Tigera Operator signer might reject the request due to invalid fields or missing permission.
38
+
39
+
When such failure occur, the CSR status object contains detailed condition and error messages that help identify the root cause.
40
+
33
41
## Common problems
34
42
35
43
### No internet connection after installing the Calico Node package
36
44
37
45
By default, $[prodname] blocks all traffic to and from host interfaces. You can use a profile with host endpoints to modify default behavior. Apply the built-in profile `projectcalico-default-allow`, which allows all ingress and egress traffic. Host endpoints that use this profile will have *allow-all* behavior instead of *deny-all* when no network policy is applied.
38
46
47
+
Example `HostEndpoint` with the `projectcalico-default-allow` profile:
48
+
49
+
```yaml
50
+
apiVersion: projectcalico.org/v3
51
+
kind: HostEndpoint
52
+
metadata:
53
+
name: <endpoint-name>
54
+
spec:
55
+
interfaceName: <interface-name>
56
+
node: <node-hostname>
57
+
expectedIPs: ["<list-of-expected-ips>"]
58
+
profiles:
59
+
- projectcalico-default-allow
60
+
```
61
+
39
62
### Certificate signed by unknown authority
40
63
41
-
If the certificate presented by the Kubernetes API server or Tigera Manager endpoint is not signed by a trusted Certificate Authority (CA), add the correct CA certificate to the system trust store. For the Calico fluent-bit log forwarding, you can temporarily disable TLS verification by setting:
64
+
If the certificate presented by the Kubernetes API server or Tigera Manager endpoint is not signed by a trusted Certificate Authority (CA), add the correct CA certificate to the system trust store. Alternatively, for the Calico fluent-bit log forwarder, you can temporarily disable TLS verifications by setting:
0 commit comments