@@ -859,8 +859,10 @@ type: kubernetes.io/tls
859
859
stringData:
860
860
# the data is abbreviated in this example
861
861
tls.crt: |
862
+ --------BEGIN CERTIFICATE-----
862
863
MIIC2DCCAcCgAwIBAgIBATANBgkqh ...
863
864
tls.key: |
865
+ -----BEGIN RSA PRIVATE KEY-----
864
866
MIIEpgIBAAKCAQEA7yn3bRHQ5FHMQ ...
865
867
` ` `
866
868
@@ -878,21 +880,8 @@ kubectl create secret tls my-tls-secret \
878
880
--key=path/to/key/file
879
881
` ` `
880
882
881
- The public/private key pair must exist before hand. The public key certificate
882
- for `--cert` must be DER format as per
883
- [Section 5.1 of RFC 7468](https://datatracker.ietf.org/doc/html/rfc7468#section-5.1),
884
- and must match the given private key for `--key` (PKCS # 8 in DER format;
885
- [Section 11 of RFC 7468](https://datatracker.ietf.org/doc/html/rfc7468#section-11)).
886
-
887
- {{< note >}}
888
- A kubernetes.io/tls Secret stores the Base64-encoded DER data for keys and
889
- certificates. If you're familiar with PEM format for private keys and for certificates,
890
- the base64 data are the same as that format except that you omit
891
- the initial and the last lines that are used in PEM.
892
-
893
- For example, for a certificate, you do **not** include `--------BEGIN CERTIFICATE-----`
894
- and `-------END CERTIFICATE----`.
895
- {{< /note >}}
883
+ The public/private key pair must exist before hand. The public key certificate for `--cert` must be .PEM encoded
884
+ and must match the given private key for `--key`.
896
885
897
886
# ## Bootstrap token Secrets
898
887
0 commit comments