docs: add note about MKE CA rotation, which is potentially dangerous

Signed-off-by: Bjorn Neergaard <bneergaard@mirantis.com>
This commit is contained in:
Bjorn Neergaard 2023-01-27 08:19:15 -07:00
parent e1152b2418
commit 00070e6e23
No known key found for this signature in database
1 changed files with 7 additions and 0 deletions

View File

@ -81,6 +81,13 @@ gyg5u9Iliel99l7SuMhNeLkrU7fXs+Of1nTyyM73ig==
### <a name="rotate"></a> Root CA rotation (--rotate) ### <a name="rotate"></a> Root CA rotation (--rotate)
> **Note**
>
> Mirantis Kubernetes Engine (MKE), formerly known as Docker UCP, provides an external
> certificate manager service for the swarm. If you run swarm on MKE, you shouldn't
> rotate the CA certificates manually. Instead, contact Mirantis support if you need
> to rotate a certificate.
Root CA Rotation is recommended if one or more of the swarm managers have been Root CA Rotation is recommended if one or more of the swarm managers have been
compromised, so that those managers can no longer connect to or be trusted by compromised, so that those managers can no longer connect to or be trusted by
any other node in the cluster. any other node in the cluster.