You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Update Certificates Best Practices.md
I've organized the required Server/Client certificates requiring PKI in a Kubernetes Cluster and improved the descriptions each point had.
* Added reviewer suggested changes
* Added explanation about kubelet server/client certificates
* Added some additional corrections I had missed
* Update content/en/docs/setup/best-practices/certificates.md
Co-authored-by: divya-mohan0209 <[email protected]>
* Update content/en/docs/setup/best-practices/certificates.md
Co-authored-by: Qiming Teng <[email protected]>
* Wrapping long lines and changing how API Server is mentioned
---------
Co-authored-by: divya-mohan0209 <[email protected]>
Co-authored-by: Qiming Teng <[email protected]>
for each kubelet (every {{< glossary_tooltip text="node" term_id="node" >}} runs a kubelet)
30
+
* Optional server certificate for the [front-proxy](/docs/tasks/extend-kubernetes/configure-aggregation-layer/)
31
+
32
+
### Client certificates
33
+
34
+
* Client certificates for each kubelet, used to authenticate to the API server as a client of
35
+
the Kubernetes API
36
+
* Client certificate for each API server, used to authenticate to etcd
37
+
* Client certificate for the controller manager to securely communicate with the API server
38
+
* Client certificate for the scheduler to securely communicate with the API server
39
+
* Client certificates, one for each node, for kube-proxy to authenticate to the API server
40
+
* Optional client certificates for administrators of the cluster to authenticate to the API server
41
+
* Optional client certificate for the [front-proxy](/docs/tasks/extend-kubernetes/configure-aggregation-layer/)
42
+
43
+
### Kubelet's server and client certificates
44
+
45
+
To establish a secure connection and authenticate itself to the kubelet, the API Server
46
+
requires a client certificate and key pair.
47
+
48
+
In this scenario, there are two approaches for certificate usage:
49
+
using shared certificates or separate certificates;
50
+
51
+
* Shared Certificates: The kube-apiserver can utilize the same certificate and key pair it uses to authenticate its clients. This means that the existing certificates, such as `apiserver.crt` and `apiserver.key`, can be used for communicating with the kubelet servers.
52
+
53
+
* Separate Certificates: Alternatively, the kube-apiserver can generate a new client certificate and key pair to authenticate its communication with the kubelet servers. In this case, a distinct certificate named `kubelet-client.crt` and its corresponding private key, `kubelet-client.key` are created.
34
54
35
55
{{< note >}}
36
56
`front-proxy` certificates are required only if you run kube-proxy to support
0 commit comments