Hi,
I am new to rancher so I apologize if this is a newbie question.
My environment is like this:
NGINX Loadbalancer (for accessing resources on both RKE clusters)=> this is where I have wildcard ssl certificate from trusted CA.
3 node RKE Cluster for Rancher.
3 node RKE cluster for application workloads.
We have bought new wildcard ssl certificate and I have replaced it on NGINX. The new certificate is from different issuer than the old one (before digicert, now Sectigo ).
When I change the certificate and key on NGINX the following happens:
Rancher console and 3 Node cluster for rancher is normally accessible.
Applications running on 3 node RKE cluster, for application workloads, are normally accessible.
I can NOT access 3 node RKE cluster, for application workloads, from rancher console:
How many certificates are in your server certificate (tls.crt)? I guess one and its missing the intermediate, so adding this to the server certificate and creating the secret with that should be enough to make the agent connect. Based on switching from one recognized CA signed certificate to antother, only the steps in Rancher Docs: Adding TLS Secrets are required.
As the manual instructs => Combine the server certificate followed by any intermediate certificate(s) needed into a file named tls.crt . Copy your certificate key into a file named tls.key .
Root CA doesn’t need to be in there. Did you verify the ingress controller is serving the correct certificate after changing? If you are running a fairly up-to-date Rancher, the logging of the agent containers on the host should show logging about the certificates state. You can also run
docker run --net=host superseb/ranchercheck https://your_rancher_url