You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The normal process of bootstrapping these components, especially worker nodes that need certificates so they can communicate safely with kube-apiserver,
29
29
can be a challenging process as it is often outside of the scope of Kubernetes and requires significant additional work.
30
30
This in turn, can make it challenging to initialize or scale a cluster.
31
31
-->
32
-
启动引导这些组件的正常过程,尤其是需要证书来与 kube-apiserver 安全通信的
33
-
工作节点,可能会是一个具有挑战性的过程,因为这一过程通常不受 Kubernetes 控制,
34
-
需要不少额外工作。
32
+
启动引导这些组件的正常过程,尤其是需要证书来与 kube-apiserver 安全通信的工作节点,
33
+
可能会是一个具有挑战性的过程,因为这一过程通常不受 Kubernetes 控制,需要不少额外工作。
35
34
这也使得初始化或者扩缩一个集群的操作变得具有挑战性。
36
35
37
36
<!--
@@ -41,9 +40,8 @@ found [here](https://github.com/kubernetes/kubernetes/pull/20439).
41
40
This document describes the process of node initialization, how to set up TLS client certificate bootstrapping for
@@ -93,9 +91,6 @@ All of the following are responsibilities of whoever sets up and manages the clu
93
91
3. Creating a key and certificate for each kubelet; strongly recommended to have a unique one, with a unique CN, for each kubelet
94
92
4. Signing the kubelet certificate using the CA key
95
93
5. Distributing the kubelet key and signed certificate to the specific node on which the kubelet is running
96
-
97
-
The TLS Bootstrapping described in this document is intended to simplify, and partially or even completely automate, steps 3 onwards, as these are the most common when initializing or scaling
98
-
a cluster.
99
94
-->
100
95
负责部署和管理集群的人有以下责任:
101
96
@@ -106,8 +101,12 @@ a cluster.
106
101
4. 使用 CA 密钥对 kubelet 证书签名
107
102
5. 将 kubelet 密钥和签名的证书发布到 kubelet 运行所在的特定节点上
108
103
109
-
本文中描述的 TLS 启动引导过程有意简化甚至完全自动化上述过程,尤其是
110
-
第三步之后的操作,因为这些步骤是初始化或者扩缩集群时最常见的操作。
104
+
<!--
105
+
The TLS Bootstrapping described in this document is intended to simplify, and partially or even completely automate, steps 3 onwards, as these are the most common when initializing or scaling
106
+
a cluster.
107
+
-->
108
+
本文中描述的 TLS 启动引导过程有意简化甚至完全自动化上述过程,
109
+
尤其是第三步之后的操作,因为这些步骤是初始化或者扩缩集群时最常见的操作。
111
110
112
111
<!--
113
112
### Bootstrap Initialization
@@ -134,8 +133,7 @@ In the bootstrap initialization process, the following occurs:
134
133
1. kubelet 启动
135
134
2. kubelet 看到自己**没有**对应的 `kubeconfig` 文件
136
135
3. kubelet 搜索并发现 `bootstrap-kubeconfig` 文件
137
-
4. kubelet 读取该启动引导文件,从中获得 API 服务器的 URL 和用途有限的
138
-
一个“令牌(Token)”
136
+
4. kubelet 读取该启动引导文件,从中获得 API 服务器的 URL 和用途有限的一个“令牌(Token)”
@@ -195,7 +193,7 @@ to sign the kubelet certificate. As before, it is your responsibility to distrib
195
193
-->
196
194
## 证书机构 {#certificate-authority}
197
195
198
-
就像在没有启动引导的情况下,你会需要证书机构(CA)密钥和证书。
196
+
就像在没有 TLS 启动引导支持的情况下,你会需要证书机构(CA)密钥和证书。
199
197
这些数据会被用来对 kubelet 证书进行签名。
200
198
如前所述,将证书机构密钥和证书发布到控制平面节点是你的责任。
201
199
@@ -205,12 +203,11 @@ We will refer to these as "Kubernetes CA certificate and key".
205
203
206
204
All Kubernetes components that use these certificates - kubelet, kube-apiserver, kube-controller-manager - assume the key and certificate to be PEM-encoded.
To enable the kubelet to request and receive a new certificate, create a `ClusterRoleBinding` that binds the group in which the bootstrapping node is a member `system:bootstrappers` to the `ClusterRole` that grants it permission, `system:certificates.k8s.io:certificatesigningrequests:nodeclient`:
0 commit comments