Thanks for posting your question in the Microsoft Q&A forum.
There isn't a direct equivalent to the kubeadm certs check-expiration
command. you can still check the status and expiration of certificates in an AKS cluster using the following methods:
- Check the overall cluster status:
az aks show --name <cluster-name> --resource-group <resource-group-name> --query "privateLinkResources[].groupId"
- Check the API server certificate:
openssl s_client -connect <cluster-fqdn>:443 -servername <cluster-fqdn> 2>/dev/null | openssl x509 -noout -dates
- Use kubectl to check certificate information:
kubectl get --raw /healthz/etcd kubectl get --raw /healthz
- Check kubelet certificate expiration:
kubectl get nodes -o jsonpath='{range .items[*]}{.metadata.name}{"\t"}{.status.conditions[?(@.type=="Ready")].message}{"\n"}{end}'
Please don't forget to close up the thread here by upvoting and accept it as an answer if it is helpful