Skip to content

Commit 0908034

Browse files
authored
Merge pull request #33130 from tengqm/move-kubelet-authn-authz
Move kubelet authn authz
2 parents dcd4d21 + a3ea9f4 commit 0908034

File tree

16 files changed

+24
-25
lines changed

16 files changed

+24
-25
lines changed

content/en/docs/concepts/architecture/control-plane-node-communication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ This document catalogs the communication paths between the control plane (apiser
2121
Kubernetes has a "hub-and-spoke" API pattern. All API usage from nodes (or the pods they run) terminates at the apiserver. None of the other control plane components are designed to expose remote services. The apiserver is configured to listen for remote connections on a secure HTTPS port (typically 443) with one or more forms of client [authentication](/docs/reference/access-authn-authz/authentication/) enabled.
2222
One or more forms of [authorization](/docs/reference/access-authn-authz/authorization/) should be enabled, especially if [anonymous requests](/docs/reference/access-authn-authz/authentication/#anonymous-requests) or [service account tokens](/docs/reference/access-authn-authz/authentication/#service-account-tokens) are allowed.
2323

24-
Nodes should be provisioned with the public root certificate for the cluster such that they can connect securely to the apiserver along with valid client credentials. A good approach is that the client credentials provided to the kubelet are in the form of a client certificate. See [kubelet TLS bootstrapping](/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/) for automated provisioning of kubelet client certificates.
24+
Nodes should be provisioned with the public root certificate for the cluster such that they can connect securely to the apiserver along with valid client credentials. A good approach is that the client credentials provided to the kubelet are in the form of a client certificate. See [kubelet TLS bootstrapping](/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/) for automated provisioning of kubelet client certificates.
2525

2626
Pods that wish to connect to the apiserver can do so securely by leveraging a service account so that Kubernetes will automatically inject the public root certificate and a valid bearer token into the pod when it is instantiated.
2727
The `kubernetes` service (in `default` namespace) is configured with a virtual IP address that is redirected (via kube-proxy) to the HTTPS endpoint on the apiserver.
@@ -49,7 +49,7 @@ To verify this connection, use the `--kubelet-certificate-authority` flag to pro
4949
If that is not possible, use [SSH tunneling](#ssh-tunnels) between the apiserver and kubelet if required to avoid connecting over an
5050
untrusted or public network.
5151

52-
Finally, [Kubelet authentication and/or authorization](/docs/reference/command-line-tools-reference/kubelet-authentication-authorization/) should be enabled to secure the kubelet API.
52+
Finally, [Kubelet authentication and/or authorization](/docs/reference/access-authn-authz/kubelet-authn-authz/) should be enabled to secure the kubelet API.
5353

5454
### apiserver to nodes, pods, and services
5555

content/en/docs/concepts/cluster-administration/_index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -63,8 +63,8 @@ Before choosing a guide, here are some considerations:
6363

6464
### Securing the kubelet
6565
* [Control Plane-Node communication](/docs/concepts/architecture/control-plane-node-communication/)
66-
* [TLS bootstrapping](/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/)
67-
* [Kubelet authentication/authorization](/docs/reference/command-line-tools-reference/kubelet-authentication-authorization/)
66+
* [TLS bootstrapping](/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/)
67+
* [Kubelet authentication/authorization](/docs/reference/acess-authn-authz/kubelet-authn-authz/)
6868

6969
## Optional Cluster Services
7070

content/en/docs/reference/access-authn-authz/_index.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,3 +24,5 @@ Reference documentation:
2424
- Service accounts
2525
- [Developer guide](/docs/tasks/configure-pod-container/configure-service-account/)
2626
- [Administration](/docs/reference/access-authn-authz/service-accounts-admin/)
27+
- [Kubelet Authentication & Authorization](/docs/reference/access-authn-authz/kubelet-authn-authz/)
28+
- including kubelet [TLS bootstrapping](/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/)

content/en/docs/reference/access-authn-authz/bootstrap-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ creating new clusters or joining new nodes to an existing cluster. It was built
1515
to support [kubeadm](/docs/reference/setup-tools/kubeadm/), but can be used in other contexts
1616
for users that wish to start clusters without `kubeadm`. It is also built to
1717
work, via RBAC policy, with the
18-
[Kubelet TLS Bootstrapping](/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/) system.
18+
[Kubelet TLS Bootstrapping](/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/) system.
1919

2020

2121
<!-- body -->

content/en/docs/reference/access-authn-authz/node.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ have the minimal set of permissions required to operate correctly.
4343
In order to be authorized by the Node authorizer, kubelets must use a credential that identifies them as
4444
being in the `system:nodes` group, with a username of `system:node:<nodeName>`.
4545
This group and user name format match the identity created for each kubelet as part of
46-
[kubelet TLS bootstrapping](/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/).
46+
[kubelet TLS bootstrapping](/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/).
4747

4848
The value of `<nodeName>` **must** match precisely the name of the node as registered by the kubelet. By default, this is the host name as provided by `hostname`, or overridden via the [kubelet option](/docs/reference/command-line-tools-reference/kubelet/) `--hostname-override`. However, when using the `--cloud-provider` kubelet option, the specific hostname may be determined by the cloud provider, ignoring the local `hostname` and the `--hostname-override` option.
4949
For specifics about how the kubelet determines the hostname, see the [kubelet options reference](/docs/reference/command-line-tools-reference/kubelet/).

content/en/docs/reference/access-authn-authz/rbac.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -798,7 +798,7 @@ This is commonly used by add-on API servers for unified authentication and autho
798798
<td><b>system:node-bootstrapper</b></td>
799799
<td>None</td>
800800
<td>Allows access to the resources required to perform
801-
<a href="/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/">kubelet TLS bootstrapping</a>.</td>
801+
<a href="/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/">kubelet TLS bootstrapping</a>.</td>
802802
</tr>
803803
<tr>
804804
<td><b>system:node-problem-detector</b></td>

content/en/docs/reference/command-line-tools-reference/feature-gates.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1086,10 +1086,10 @@ Each feature gate is designed for enabling/disabling a specific feature:
10861086
[Bound Service Account Tokens](https://github.com/kubernetes/enhancements/blob/master/keps/sig-auth/1205-bound-service-account-tokens/README.md)
10871087
for more details.
10881088
- `RotateKubeletClientCertificate`: Enable the rotation of the client TLS certificate on the kubelet.
1089-
See [kubelet configuration](/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/#kubelet-configuration)
1089+
See [kubelet configuration](/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/#kubelet-configuration)
10901090
for more details.
10911091
- `RotateKubeletServerCertificate`: Enable the rotation of the server TLS certificate on the kubelet.
1092-
See [kubelet configuration](/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/#kubelet-configuration)
1092+
See [kubelet configuration](/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/#kubelet-configuration)
10931093
for more details.
10941094
- `RunAsGroup`: Enable control over the primary group ID set on the init
10951095
processes of containers.

content/en/docs/reference/setup-tools/kubeadm/implementation-details.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -219,7 +219,7 @@ Other API server flags that are set unconditionally are:
219219

220220
- `--insecure-port=0` to avoid insecure connections to the api server
221221
- `--enable-bootstrap-token-auth=true` to enable the `BootstrapTokenAuthenticator` authentication module.
222-
See [TLS Bootstrapping](/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/) for more details
222+
See [TLS Bootstrapping](/docs/reference/access-authn-authn/kubelet-tls-bootstrapping/) for more details
223223
- `--allow-privileged` to `true` (required e.g. by kube proxy)
224224
- `--requestheader-client-ca-file` to `front-proxy-ca.crt`
225225
- `--enable-admission-plugins` to:
@@ -266,7 +266,7 @@ The static Pod manifest for the controller manager is affected by following para
266266
Other flags that are set unconditionally are:
267267

268268
- `--controllers` enabling all the default controllers plus `BootstrapSigner` and `TokenCleaner` controllers for TLS bootstrap.
269-
See [TLS Bootstrapping](/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/) for more details
269+
See [TLS Bootstrapping](/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/) for more details
270270
- `--use-service-account-credentials` to `true`
271271
- Flags for using certificates generated in previous steps:
272272
- `--root-ca-file` to `ca.crt`

0 commit comments

Comments
 (0)