Ensure that the --peer-auto-tls argument is not set to true (etcd) (Openshift)

Do not use automatically generated self-signed certificates for TLS connections between peers.

Risk Level: Informational
Cloud Entity: Pods
CloudGuard Rule ID: D9.K8S.CRY.39
Covered by Spectral: No
Category: Compute


KubernetesPod where labels contain [value='etcd'] and namespace = 'openshift-etcd' should not have spec.containers with [parsedArgs contain [key like 'peer-auto-tls' and value like 'true%']]


This setting is managed by the cluster etcd operator. No remediation required.


  1. https://docs.openshift.com/container-platform/4.5/security/certificate-types-descriptions.html#etcd-certificates_ocp-certificates
  2. https://github.com/openshift/cluster-etcd-operator
  3. https://github.com/openshift/cluster-etcd-operator/blob/release-4.5/bindata/etcd/pod.yaml#L154-L167
  4. https://github.com/openshift/cluster-etcd-operator/blob/master/bindata/etcd/pod.yaml#L154-L167
  5. https://etcd.io/
  6. https://etcd.io/#peer-auto-tls


Pods are the smallest deployable units of computing that can be created and managed in Kubernetes.A Pod is a group of one or more containers (such as Docker containers), with shared storage/network, and a specification for how to run the containers.

Compliance Frameworks

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0