eolab:crunchy_cloud:issues:jupyterhub-spawn-failed-certifcate-verify-failed
Differences
This shows you the differences between two versions of the page.
| eolab:crunchy_cloud:issues:jupyterhub-spawn-failed-certifcate-verify-failed [2024/12/18 12:20] – created jan.sonntag | eolab:crunchy_cloud:issues:jupyterhub-spawn-failed-certifcate-verify-failed [2024/12/18 13:46] (current) – azam01 | ||
|---|---|---|---|
| Line 9: | Line 9: | ||
| It could be solved by ssh' | It could be solved by ssh' | ||
| + | |||
| + | To solve the certificate expiration issue we need to first list and see which certificates have expired. | ||
| + | |||
| + | To list certificates in microk8s: | ||
| + | |||
| + | < | ||
| + | |||
| + | This command will output a list of certificates and the time left for their expiration. | ||
| + | The output looks like this: | ||
| + | |||
| + | < | ||
| + | The CA certificate will expire in 3284 days. | ||
| + | The server certificate will expire in 364 days. | ||
| + | The front proxy client certificate will expire in 364 days. | ||
| + | </ | ||
| + | |||
| + | In our case the '' | ||
| + | |||
| + | To renew the certificates we run the following commands: | ||
| + | |||
| + | < | ||
| + | sudo microk8s refresh-certs -e server.crt | ||
| + | sudo microk8s refresh-certs -e front-proxy-client.crt | ||
| + | </ | ||
| + | |||
| + | With these commands the certificates are updated and the services are automatically restarted. | ||
| + | |||
| Source: https:// | Source: https:// | ||
eolab/crunchy_cloud/issues/jupyterhub-spawn-failed-certifcate-verify-failed.1734520815.txt.gz · Last modified: 2024/12/18 12:20 by jan.sonntag