talosctl get KubernetesDynamicCerts -o yaml on the controlplane.
Client certificates (talosconfig and kubeconfig) are the user’s responsibility.
Each time you download the kubeconfig file from a Talos Linux cluster, the client certificate is regenerated giving you a kubeconfig which is valid for a year.
The talosconfig file should be renewed at least once a year, using the talosctl config new command, as shown below, or by one of the other methods.
Generating New Client Configuration
Using Controlplane Node
If you have a valid (not expired)talosconfig with os:admin role,
a new client configuration file can be generated with talosctl config new against
any controlplane node:
From Secrets Bundle
If a secrets bundle (secrets.yaml from talosctl gen secrets) was saved while
generating machine configuration:
Note:<cluster-name>and<cluster-endpoint>arguments don’t matter, as they are not used fortalosconfig.
From Control Plane Machine Configuration
In order to create a new key pair for client configuration, you will need the root Talos API CA. The base64 encoded CA can be found in the control plane node’s configuration file. Save the CA public key, and CA private key asca.crt, and ca.key respectively:
talosconfig: