Overview
Every K8SaaS cluster has a dedicated certificate authority (CA) generated at provisioning time. The CA signs all cluster component certificates (API server, etcd, kubelet) and kubeconfig client certificates. Administrators rotate the CA when certificates approach expiry, when credentials are suspected compromised, or after a security incident.View Cluster CA
- Dashboard
- CLI
Navigate to Admin → Containers → Clusters, click a cluster, and select
Actions → Show CA to view the cluster’s current CA certificate (public key only).
Rotate the Cluster CA
- Dashboard
- CLI
Notify users
Send advance notice to all users with cluster access that their kubeconfigs
will be invalidated at the scheduled rotation time.
Initiate rotation
Navigate to Admin → Containers → Clusters, click the cluster, and select
Actions → Rotate CA. Confirm the rotation.The cluster enters
UPDATE_IN_PROGRESS during CA regeneration.Certificate Expiry Planning
Plan CA rotations proactively to avoid service disruption from expired certificates.| Certificate | Default Validity | Action Required |
|---|---|---|
| Cluster CA | 10 years | Rotate 90 days before expiry |
| API server TLS | 1 year (auto-renewed) | Monitor via openssl x509 -noout -dates |
| Node kubelet certificates | 1 year (auto-renewed) | Ensure auto_healing_enabled=true in template |
Audit all cluster CA expiry dates
Xloud Key Management Integration
For the highest security posture, store cluster CA private keys in Xloud Key Management rather than in the K8SaaS database.Xloud Key Management must be deployed and the
magnum service account must have the
creator role on the Key Management service before enabling this integration.- XDeploy
- CLI
Enable KMS
Set Enable KMS to Yes. This deploys the Xloud Key Management service
and configures service account integration.
Set certificate manager type
Open XDeploy → Advanced Configuration, select magnum in the Service Tree,
then open or create Click Save Current File.
kubernetes.conf. Add the following in the Code Editor:kubernetes.conf
Next Steps
Security
Configure RBAC and node security groups alongside certificate management.
Monitoring
Monitor certificate expiry and cluster health across all projects.
Cluster Upgrades (User)
Advise users on refreshing kubeconfigs after upgrades and CA rotations.
Key Manager
Configure Xloud Key Management for secure CA private key storage.