Skip to content

Commit 31abcec

Browse files
authored
Merge pull request #21244 from tnqn/apiserver-port
Unify typical apiserver port in docs
2 parents a8a5a5a + c1693b5 commit 31abcec

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

content/en/docs/concepts/architecture/control-plane-node-communication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ This document catalogs the communication paths between the control plane (really
1818
<!-- body -->
1919

2020
## Node to Control Plane
21-
All communication paths from the nodes to the control plane terminate at the apiserver (none of the other master components are designed to expose remote services). In a typical deployment, the apiserver is configured to listen for remote connections on a secure HTTPS port (443) with one or more forms of client [authentication](/docs/reference/access-authn-authz/authentication/) enabled.
21+
Kubernetes has a "hub-and-spoke" API pattern. All API usage from nodes (or the pods they run) terminate at the apiserver (none of the other control plane components are designed to expose remote services). The apiserver is configured to listen for remote connections on a secure HTTPS port (typically 443) with one or more forms of client [authentication](/docs/reference/access-authn-authz/authentication/) enabled.
2222
One or more forms of [authorization](/docs/reference/access-authn-authz/authorization/) should be enabled, especially if [anonymous requests](/docs/reference/access-authn-authz/authentication/#anonymous-requests) or [service account tokens](/docs/reference/access-authn-authz/authentication/#service-account-tokens) are allowed.
2323

2424
Nodes should be provisioned with the public root certificate for the cluster such that they can connect securely to the apiserver along with valid client credentials. For example, on a default GKE deployment, the client credentials provided to the kubelet are in the form of a client certificate. See [kubelet TLS bootstrapping](/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/) for automated provisioning of kubelet client certificates.

content/en/docs/reference/access-authn-authz/controlling-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ following diagram:
2323

2424
## Transport Security
2525

26-
In a typical Kubernetes cluster, the API serves on port 6443.
26+
In a typical Kubernetes cluster, the API serves on port 443.
2727
The API server presents a certificate. This certificate is
2828
often self-signed, so `$USER/.kube/config` on the user's machine typically
2929
contains the root certificate for the API server's certificate, which when specified

0 commit comments

Comments
 (0)