You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/docs/setup/best-practices/certificates.md
+42-36Lines changed: 42 additions & 36 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,15 +42,19 @@ Kubernetes requires PKI for the following operations:
42
42
43
43
### Kubelet's server and client certificates
44
44
45
-
To establish a secure connection and authenticate itself to the kubelet, the API Server
46
-
requires a client certificate and key pair.
45
+
To establish a secure connection and authenticate itself to the kubelet, the API Server
46
+
requires a client certificate and key pair.
47
47
48
-
In this scenario, there are two approaches for certificate usage:
49
-
using shared certificates or separate certificates;
48
+
In this scenario, there are two approaches for certificate usage:
50
49
51
-
* Shared Certificates: The kube-apiserver can utilize the same certificate and key pair it uses to authenticate its clients. This means that the existing certificates, such as `apiserver.crt` and `apiserver.key`, can be used for communicating with the kubelet servers.
50
+
* Shared Certificates: The kube-apiserver can utilize the same certificate and key pair it uses
51
+
to authenticate its clients. This means that the existing certificates, such as `apiserver.crt`
52
+
and `apiserver.key`, can be used for communicating with the kubelet servers.
52
53
53
-
* Separate Certificates: Alternatively, the kube-apiserver can generate a new client certificate and key pair to authenticate its communication with the kubelet servers. In this case, a distinct certificate named `kubelet-client.crt` and its corresponding private key, `kubelet-client.key` are created.
54
+
* Separate Certificates: Alternatively, the kube-apiserver can generate a new client certificate
55
+
and key pair to authenticate its communication with the kubelet servers. In this case,
56
+
a distinct certificate named `kubelet-client.crt` and its corresponding private key,
57
+
`kubelet-client.key` are created.
54
58
55
59
{{< note >}}
56
60
`front-proxy` certificates are required only if you run kube-proxy to support
@@ -80,7 +84,7 @@ multiple intermediate CAs, and delegate all further creation to Kubernetes itsel
Node conformance test is a containerized version of [node e2e test](https://github.com/kubernetes/community/blob/master/contributors/devel/sig-node/e2e-node-tests.md).
80
+
Node conformance test is a containerized version of
0 commit comments