You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/certificate-rotation.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,12 +25,12 @@ AKS generates and uses the following certificates, Certificate Authorities (CA),
25
25
26
26
* The AKS API server creates a CA called the Cluster CA.
27
27
* The API server has a Cluster CA, which signs certificates for one-way communication from the API server to kubelets.
28
-
* Each kubelet creates a Certificate Signing Request (CSR), which is signed by the Cluster CA, for communication from the kubelet to the API server.
28
+
* Each kubelet creates a Certificate Signing Request (CSR), which the Cluster CA signs, for communication from the kubelet to the API server.
29
29
* The API aggregator uses the Cluster CA to issue certificates for communication with other APIs. The API aggregator can also have its own CA for issuing those certificates, but it currently uses the Cluster CA.
30
-
* Each node uses an SA token, which is signed by the Cluster CA.
30
+
* Each node uses an SA token, which the Cluster CA signs.
31
31
* The `kubectl` client has a certificate for communicating with the AKS cluster.
32
32
33
-
All certificates mentioned in this section, except for the cluster certificate, are maintained by Microsoft.
33
+
Microsoft maintains all certificates mentioned in this section, except for the cluster certificate.
34
34
35
35
> [!NOTE]
36
36
>
@@ -87,7 +87,7 @@ For any AKS clusters created or upgraded after March 2022, Azure Kubernetes Serv
87
87
88
88
### How to check whether current agent node pool is TLS Bootstrapping enabled?
89
89
90
-
1. Verify if TLS Bootstrapping is enabled on your cluster by browsing to one to the following paths:
90
+
1. Verify if your cluster has TLS Bootstrapping enabled by browsing to one to the following paths:
91
91
92
92
* On a Linux node: */var/lib/kubelet/bootstrap-kubeconfig* or */host/var/lib/kubelet/bootstrap-kubeconfig*
0 commit comments