You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You can use the `check-expiration` subcommand to check certificate expiration.
95
+
You can use the `check-expiration` subcommand to check when certificates expire:
87
96
-->
88
97
## 检查证书是否过期
89
98
90
-
你可以使用 `check-expiration`子命令来检查证书是否过期
99
+
你可以使用 `check-expiration`子命令来检查证书何时过期
91
100
92
101
```shell
93
102
kubeadm alpha certs check-expiration
94
-
```
103
+
```
95
104
96
-
<!-- The output is similar to this: -->
105
+
<!--
106
+
The output is similar to this:
107
+
-->
97
108
输出类似于以下内容:
98
109
99
110
```
@@ -118,8 +129,9 @@ front-proxy-ca Dec 28, 2029 23:36 UTC 9y no
118
129
<!--
119
130
The command shows expiration/residual time for the client certificates in the `/etc/kubernetes/pki` folder and for the client certificate embedded in the KUBECONFIG files used by kubeadm (`admin.conf`, `controller-manager.conf` and `scheduler.conf`).
Additionally, kubeadm informs the user if the certificate is externally managed; in this case, the user should take care of managing certificate renewal manually/using other tools.
@@ -129,9 +141,9 @@ Additionally, kubeadm informs the user if the certificate is externally managed;
129
141
130
142
<!--
131
143
`kubeadm` cannot manage certificates signed by an external CA.
`kubeadm` renews all the certificates during control plane [upgrade](/docs/tasks/administer-cluster/kubeadm/kubeadm-upgrade-1-15/).
167
179
-->
180
+
168
181
## 自动更新证书
169
182
170
183
`kubeadm`会在控制面
@@ -224,24 +237,29 @@ If you are running an HA cluster, this command needs to be executed on all the c
224
237
如果你运行了一个 HA 集群,这个命令需要在所有控制面板节点上执行。
225
238
{{< /warning >}}
226
239
227
-
<!-- `alpha certs renew` uses the existing certificates as the authoritative source for attributes (Common Name, Organization, SAN, etc.) instead of the kubeadm-config ConfigMap. It is strongly recommended to keep them both in sync. -->
240
+
<!--
241
+
` certs renew`uses the existing certificates as the authoritative source for attributes (Common Name, Organization, SAN, etc.) instead of the kubeadm-config ConfigMap. It is strongly recommended to keep them both in sync.
`kubeadm alpha certs renew` provides the following options:
250
+
-->
251
+
`kubeadm certs renew`提供以下选项:
252
+
233
253
<!--
234
254
The Kubernetes certificates normally reach their expiration date after one year.
235
255
-->
236
256
Kubernetes 证书通常在一年后到期。
237
257
238
258
<!--
239
-
`kubeadm alpha certs renew` provides the following options:
240
259
241
260
- `--csr-only`can be used to renew certificats with an external CA by generating certificate signing requests (without actually renewing certificates in place); see next paragraph for more information.
242
261
- It's also possible to renew a single certificate instead of all.
243
262
-->
244
-
`kubeadm alpha certs renew`提供下列选项
245
263
246
264
- `--csr-only`可用于经过一个外部 CA 生成的证书签名请求来更新证书(无需实际替换更新证书);
247
265
更多信息请参见下节。
@@ -268,10 +286,11 @@ These are advanced topics for users who need to integrate their organization's c
268
286
### Set up a signer
269
287
270
288
The Kubernetes Certificate Authority does not work out of the box.
271
-
You can configure an external signer such as [cert-manager][cert-manager-issuer], or you can use the build-in signer.
272
-
The built-in signer is part of [`kube-controller-manager`][kcm].
273
-
To activate the build-in signer, you pass the `--cluster-signing-cert-file` and `--cluster-signing-key-file` arguments.
289
+
You can configure an external signer such as [cert-manager](https://docs.cert-manager.io/en/latest/tasks/issuers/setup-ca.html), or you can use the build-in signer.
290
+
The built-in signer is part of [`kube-controller-manager`](/docs/reference/command-line-tools-reference/kube-controller-manager/).
291
+
To activate the build-in signer, you must pass the `--cluster-signing-cert-file` and `--cluster-signing-key-file` flags.
The built-in signer is part of [`kube-controller-manager`][kcm].
288
-
To activate the build-in signer, you must pass the `--cluster-signing-cert-file` and `--cluster-signing-key-file` flags.
306
+
If you're creating a new cluster, you can use a kubeadm [configuration file](https://godoc.org/k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm/v1beta2):
If you set up an external signer such as [cert-manager][cert-manager], certificate signing requests (CSRs) are automatically approved.
319
-
Otherwise, you must manually approve certificates with the [`kubectl certificate`][certs] command.
330
+
If you set up an external signer such as [cert-manager](https://github.com/jetstack/cert-manager), certificate signing requests (CSRs) are automatically approved.
331
+
Otherwise, you must manually approve certificates with the [`kubectl certificate`](/docs/setup/best-practices/certificates/) command.
320
332
The following kubeadm command outputs the name of the certificate to approve, then blocks and waits for approval to occur:
0 commit comments