You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This is in prep for link checker. By using inline links everywhere, we:
- reduce the risk of dangling, missing, unused links as you can see from the PR;
- simplify the link checker logic (under development).
There are two types of system components: those that run in a container and those
@@ -109,7 +108,7 @@ that do not run in a container. For example:
109
108
On machines with systemd, the kubelet and container runtime write to journald. If
110
109
systemd is not present, they write to `.log` files in the `/var/log` directory.
111
110
System components inside containers always write to the `/var/log` directory,
112
-
bypassing the default logging mechanism. They use the [klog][klog]
111
+
bypassing the default logging mechanism. They use the [klog](https://github.com/kubernetes/klog)
113
112
logging library. You can find the conventions for logging severity for those
114
113
components in the [development docs on logging](https://github.com/kubernetes/community/blob/master/contributors/devel/sig-instrumentation/logging.md).
115
114
@@ -118,8 +117,6 @@ directory should be rotated. In Kubernetes clusters brought up by
118
117
the `kube-up.sh` script, those logs are configured to be rotated by
119
118
the `logrotate` tool daily or once the size exceeds 100MB.
120
119
121
-
[klog]: https://github.com/kubernetes/klog
122
-
123
120
## Cluster-level logging architectures
124
121
125
122
While Kubernetes does not provide a native solution for cluster-level logging, there are several common approaches you can consider. Here are some options:
Copy file name to clipboardExpand all lines: content/en/docs/setup/best-practices/certificates.md
+7-9Lines changed: 7 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ Kubernetes requires PKI for the following operations:
28
28
* Client certificate for the API server to talk to etcd
29
29
* Client certificate/kubeconfig for the controller manager to talk to the API server
30
30
* Client certificate/kubeconfig for the scheduler to talk to the API server.
31
-
* Client and server certificates for the [front-proxy][proxy]
31
+
* Client and server certificates for the [front-proxy](/docs/tasks/extend-kubernetes/configure-aggregation-layer/)
32
32
33
33
{{< note >}}
34
34
`front-proxy` certificates are required only if you run kube-proxy to support [an extension API server](/docs/tasks/extend-kubernetes/setup-extension-api-server/).
[1]: any other IP or DNS name you contact your cluster on (as used by [kubeadm][kubeadm] the load balancer stable IP and/or DNS name, `kubernetes`, `kubernetes.default`, `kubernetes.default.svc`,
77
+
[1]: any other IP or DNS name you contact your cluster on (as used by [kubeadm](/docs/reference/setup-tools/kubeadm/kubeadm/)
78
+
the load balancer stable IP and/or DNS name, `kubernetes`, `kubernetes.default`, `kubernetes.default.svc`,
Certificates should be placed in a recommended path (as used by [kubeadm][kubeadm]). Paths should be specified using the given argument regardless of location.
103
+
Certificates should be placed in a recommended path (as used by [kubeadm](/docs/reference/setup-tools/kubeadm/kubeadm/)).
104
+
Paths should be specified using the given argument regardless of location.
Copy file name to clipboardExpand all lines: content/en/docs/tasks/administer-cluster/kubeadm/kubeadm-certs.md
+20-32Lines changed: 20 additions & 32 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,15 +12,11 @@ weight: 10
12
12
13
13
Client certificates generated by [kubeadm](/docs/reference/setup-tools/kubeadm/kubeadm/) expire after 1 year. This page explains how to manage certificate renewals with kubeadm.
14
14
15
-
16
-
17
15
## {{% heading "prerequisites" %}}
18
16
19
17
20
18
You should be familiar with [PKI certificates and requirements in Kubernetes](/docs/setup/best-practices/certificates/).
21
19
22
-
23
-
24
20
<!-- steps -->
25
21
26
22
## Using custom certificates {#custom-certificates}
@@ -155,33 +151,29 @@ These are advanced topics for users who need to integrate their organization's c
155
151
### Set up a signer
156
152
157
153
The Kubernetes Certificate Authority does not work out of the box.
158
-
You can configure an external signer such as [cert-manager][cert-manager-issuer], or you can use the built-in signer.
154
+
You can configure an external signer such as [cert-manager](https://docs.cert-manager.io/en/latest/tasks/issuers/setup-ca.html), or you can use the built-in signer.
159
155
160
-
The built-in signer is part of [`kube-controller-manager`][kcm].
156
+
The built-in signer is part of [`kube-controller-manager`](/docs/reference/command-line-tools-reference/kube-controller-manager/).
161
157
162
158
To activate the built-in signer, you must pass the `--cluster-signing-cert-file` and `--cluster-signing-key-file` flags.
163
159
164
-
If you're creating a new cluster, you can use a kubeadm [configuration file][config]:
160
+
If you're creating a new cluster, you can use a kubeadm [configuration file](https://godoc.org/k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm/v1beta2):
You can create the certificate signing requests for the Kubernetes certificates API with `kubeadm alpha certs renew --use-api`.
182
174
183
-
If you set up an external signer such as [cert-manager][cert-manager], certificate signing requests (CSRs) are automatically approved.
184
-
Otherwise, you must manually approve certificates with the [`kubectl certificate`][certs] command.
175
+
If you set up an external signer such as [cert-manager](https://github.com/jetstack/cert-manager), certificate signing requests (CSRs) are automatically approved.
176
+
Otherwise, you must manually approve certificates with the [`kubectl certificate`](/docs/setup/best-practices/certificates/) command.
185
177
The following kubeadm command outputs the name of the certificate to approve, then blocks and waits for approval to occur:
186
178
187
179
```shell
@@ -197,7 +189,7 @@ The output is similar to this:
197
189
198
190
If you set up an external signer, certificate signing requests (CSRs) are automatically approved.
199
191
200
-
Otherwise, you must manually approve certificates with the [`kubectl certificate`][certs] command. e.g.
192
+
Otherwise, you must manually approve certificates with the [`kubectl certificate`](/docs/setup/best-practices/certificates/) command. e.g.
[usages in the config file](https://github.com/cloudflare/cfssl/blob/master/doc/cmd/cfssl.txt#L170).
236
231
237
232
After a certificate is signed using your preferred method, the certificate and the private key must be copied to the PKI directory (by default `/etc/kubernetes/pki`).
0 commit comments