I'm facing a frustrating issue with kubectl in my corporate environment where Zscaler's SSL inspection is active. It's breaking the trust chain, causing all my connections to fail. I've tried multiple configuration options, like using the Zscaler root certificate, and even combining the base64 for both the Zscaler and cluster certificates. Unfortunately, nothing seems to work. The Zscaler certificate is installed in my Mac's keychain, but kubectl doesn't seem to be referencing it. Is there a way for kubectl to utilize the keychain like Python does? If that's not possible, how can I fix my config file? Any help would be greatly appreciated!
3 Answers
Zscaler can really be a nightmare to work with! I've had similar pain points. What worked for me was creating a single PEM bundle that includes all your necessary certificates, and then pointing your kubeconfig at that bundle. It should help with the SSL issues you’re facing.
I hear you on the frustration! You might want to check if the Certificate Authority is defined in your kubeconfig. There’s a `--certificate-authority` option you can use that allows you to specify the path to your CA cert file. It could override any existing settings that aren't working.
Just adding the new server CA directly into your kubeconfig might be a straightforward solution. I had a similar setup and that worked well for us! Just make sure you have the right certs bundled together.

Related Questions
Can't Load PhpMyadmin On After Server Update
Redirect www to non-www in Apache Conf
How To Check If Your SSL Cert Is SHA 1
Windows TrackPad Gestures