You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Adding diagrams to certificates page
* Cropped diagrams
* Changed diagrams to tree output
* Formatting fix
* Fixed text block markup and spacing
* Changed tree view of files to full-path view
* Changed order of two cert files
* Broke up links into separate sentences, per review comment
* More changes per review comments
Copy file name to clipboardExpand all lines: content/en/docs/setup/best-practices/certificates.md
+47-3Lines changed: 47 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,11 +38,13 @@ etcd also implements mutual TLS to authenticate clients and peers.
38
38
39
39
## Where certificates are stored
40
40
41
-
If you install Kubernetes with kubeadm, certificates are stored in `/etc/kubernetes/pki`. All paths in this documentation are relative to that directory.
41
+
If you install Kubernetes with kubeadm, most certificates are stored in `/etc/kubernetes/pki`. All paths in this documentation are relative to that directory, with the exception of user account certificates which kubeadm places in `/etc/kubernetes`.
42
42
43
43
## Configure certificates manually
44
44
45
-
If you don't want kubeadm to generate the required certificates, you can create them in either of the following ways.
45
+
If you don't want kubeadm to generate the required certificates, you can create them using a single root CA or by providing all certificates. See [Certificates](/docs/tasks/administer-cluster/certificates/) for details on creating your own certificate authority.
46
+
See [Certificate Management with kubeadm](/docs/tasks/administer-cluster/kubeadm/kubeadm-certs/) for more on managing certificates.
47
+
46
48
47
49
### Single root CA
48
50
@@ -57,7 +59,16 @@ Required CAs:
57
59
| front-proxy-ca.crt,key | kubernetes-front-proxy-ca | For the [front-end proxy](/docs/tasks/extend-kubernetes/configure-aggregation-layer/)|
58
60
59
61
On top of the above CAs, it is also necessary to get a public/private key pair for service account management, `sa.key` and `sa.pub`.
62
+
The following example illustrates the CA key and certificate files shown in the previous table:
60
63
64
+
```
65
+
/etc/kubernetes/pki/ca.crt
66
+
/etc/kubernetes/pki/ca.key
67
+
/etc/kubernetes/pki/etcd/ca.crt
68
+
/etc/kubernetes/pki/etcd/ca.key
69
+
/etc/kubernetes/pki/front-proxy-ca.crt
70
+
/etc/kubernetes/pki/front-proxy-ca.key
71
+
```
61
72
### All certificates
62
73
63
74
If you don't wish to copy the CA private keys to your cluster, you can generate all certificates yourself.
@@ -127,6 +138,32 @@ Same considerations apply for the service account key pair:
The following example illustrates the file paths [from the previous tables](/docs/setup/best-practices/certificates/#certificate-paths) you need to provide if you are generating all of your own keys and certificates:
142
+
143
+
```
144
+
/etc/kubernetes/pki/etcd/ca.key
145
+
/etc/kubernetes/pki/etcd/ca.crt
146
+
/etc/kubernetes/pki/apiserver-etcd-client.key
147
+
/etc/kubernetes/pki/apiserver-etcd-client.crt
148
+
/etc/kubernetes/pki/ca.key
149
+
/etc/kubernetes/pki/ca.crt
150
+
/etc/kubernetes/pki/apiserver.key
151
+
/etc/kubernetes/pki/apiserver.crt
152
+
/etc/kubernetes/pki/apiserver-kubelet-client.key
153
+
/etc/kubernetes/pki/apiserver-kubelet-client.crt
154
+
/etc/kubernetes/pki/front-proxy-ca.key
155
+
/etc/kubernetes/pki/front-proxy-ca.crt
156
+
/etc/kubernetes/pki/front-proxy-client.key
157
+
/etc/kubernetes/pki/front-proxy-client.crt
158
+
/etc/kubernetes/pki/etcd/server.key
159
+
/etc/kubernetes/pki/etcd/server.crt
160
+
/etc/kubernetes/pki/etcd/peer.key
161
+
/etc/kubernetes/pki/etcd/peer.crt
162
+
/etc/kubernetes/pki/etcd/healthcheck-client.key
163
+
/etc/kubernetes/pki/etcd/healthcheck-client.crt
164
+
/etc/kubernetes/pki/sa.key
165
+
/etc/kubernetes/pki/sa.pub
166
+
```
130
167
## Configure certificates for user accounts
131
168
132
169
You must manually configure these administrator account and service accounts:
@@ -146,7 +183,7 @@ The value of `<nodeName>` for `kubelet.conf` **must** match precisely the value
0 commit comments