Security certificates in OpenShift are not optional details. They are the trust layer between users, services, and the cluster itself. A single misstep—an expired CA, a misconfigured route, a missing SAN—can break critical workloads, stop deployments, and leave sensitive data exposed. Understanding how OpenShift manages, rotates, and validates certificates is not just maintenance. It’s survival.
OpenShift uses certificates for internal communication, API access, ingress routes, and more. These include service-serving certificates, kubelet client certificates, ingress certificates for routes, and the cluster’s own API server certificates. Each type has a lifespan. Each has renewal rules. Miss one renewal and the platform starts shutting doors.
The default certificate rotation process in OpenShift is automated, but automation isn’t a safety net if you’re not watching. Internal certificates generally rotate before expiry, but ingress certificates tied to custom routes often require manual rotation. Custom domains mean custom certificates, and these must be handled with proper key storage, strong encryption, and a documented update process.
A complete OpenShift certificate strategy starts with inventory. Every active certificate in the cluster should be known, categorized, and monitored. OpenShift provides commands through oc to inspect expiration dates for API, etcd, and node certificates. For example:
oc get csr
oc get secrets -n openshift-ingress
oc get apiserver cluster -o yaml
Monitoring tools should alert well before expiration. A 90-day notice is the safest buffer. Renewals must be tested in non-production first because an incorrect certificate can take down the control plane.