You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Finally, with the control plane properly set up and all of the necessary authentication and authorization in place, we can configure the kubelet.
615
+
Finally, with the control plane nodes properly set up and all of the necessary authentication and authorization in place, we can configure the kubelet.
616
616
-->
617
617
## kubelet 配置 {#kubelet-configuration}
618
618
@@ -678,7 +678,7 @@ The important elements to note are:
678
678
679
679
* `certificate-authority`:指向 CA 文件的路径,用来对 kube-apiserver 所出示
680
680
的服务器证书进行验证
681
-
* `server`:用来访问 kube-apiserver 的 URL
681
+
* `server`:用来访问 kube-apiserver 的 URL
682
682
* `token`:要使用的令牌
683
683
684
684
<!--
@@ -733,7 +733,7 @@ uses to authenticate to kube-apiserver.
733
733
-->
734
734
### 客户和服务证书 {#client-and-serving-certificates}
735
735
736
-
前文所述的内容都与 kubelet _客户端_ 证书相关,尤其是 kubelet 用来向
736
+
前文所述的内容都与 kubelet **客户端**证书相关,尤其是 kubelet 用来向
737
737
kube-apiserver 认证自身身份的证书。
738
738
739
739
<!--
@@ -744,7 +744,7 @@ To secure these, the kubelet can do one of:
744
744
* create self-signed key and certificate, if a key and certificate are not provided
745
745
* request serving certificates from the cluster server, via the CSR API
746
746
-->
747
-
kubelet 也可以使用 _服务(Serving)_ 证书。kubelet 自身向外提供一个
747
+
kubelet 也可以使用**服务(Serving)**证书。kubelet 自身向外提供一个
748
748
HTTPS 末端,包含若干功能特性。要保证这些末端的安全性,kubelet 可以执行以下操作
749
749
之一:
750
750
@@ -814,9 +814,9 @@ controller, or manually approve the serving certificate requests.
Like the kubelet, these other components also require a method of authenticating to kube-apiserver.
@@ -865,13 +864,12 @@ You have several options for generating these credentials:
865
864
* The old way: Create and distribute certificates the same way you did for kubelet before TLS bootstrapping
866
865
* DaemonSet: Since the kubelet itself is loaded on each node, and is sufficient to start base services, you can run kube-proxy and other node-specific services not as a standalone process, but rather as a daemonset in the `kube-system` namespace. Since it will be in-cluster, you can give it a proper service account with appropriate permissions to perform its activities. This may be the simplest way to configure such services.
The kubelet takes a set of PodSpecs that are provided through various mechanisms and ensures that the containers described in those PodSpecs are running and healthy. The kubelet doesn't manage containers which were not created by Kubernetes.
0 commit comments