Skip to content

Commit 83be6d3

Browse files
authored
updating the outdated word
1 parent 55a6fd2 commit 83be6d3

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

content/en/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ content_type: concept
1010

1111
<!-- overview -->
1212

13-
In a Kubernetes cluster, the components on the worker nodes - kubelet and kube-proxy - need to communicate with Kubernetes master components, specifically kube-apiserver.
13+
In a Kubernetes cluster, the components on the worker nodes - kubelet and kube-proxy - need to communicate with Kubernetes control plane components, specifically kube-apiserver.
1414
In order to ensure that communication is kept private, not interfered with, and ensure that each component of the cluster is talking to another trusted component, we strongly
1515
recommend using client TLS certificates on nodes.
1616

@@ -44,7 +44,7 @@ Note that the above process depends upon:
4444
All of the following are responsibilities of whoever sets up and manages the cluster:
4545

4646
1. Creating the CA key and certificate
47-
2. Distributing the CA certificate to the master nodes, where kube-apiserver is running
47+
2. Distributing the CA certificate to the control plane nodes, where kube-apiserver is running
4848
3. Creating a key and certificate for each kubelet; strongly recommended to have a unique one, with a unique CN, for each kubelet
4949
4. Signing the kubelet certificate using the CA key
5050
5. Distributing the kubelet key and signed certificate to the specific node on which the kubelet is running
@@ -90,9 +90,9 @@ In addition, you need your Kubernetes Certificate Authority (CA).
9090
## Certificate Authority
9191

9292
As without bootstrapping, you will need a Certificate Authority (CA) key and certificate. As without bootstrapping, these will be used
93-
to sign the kubelet certificate. As before, it is your responsibility to distribute them to master nodes.
93+
to sign the kubelet certificate. As before, it is your responsibility to distribute them to control plane nodes.
9494

95-
For the purposes of this document, we will assume these have been distributed to master nodes at `/var/lib/kubernetes/ca.pem` (certificate) and `/var/lib/kubernetes/ca-key.pem` (key).
95+
For the purposes of this document, we will assume these have been distributed to control plane nodes at `/var/lib/kubernetes/ca.pem` (certificate) and `/var/lib/kubernetes/ca-key.pem` (key).
9696
We will refer to these as "Kubernetes CA certificate and key".
9797

9898
All Kubernetes components that use these certificates - kubelet, kube-apiserver, kube-controller-manager - assume the key and certificate to be PEM-encoded.
@@ -234,7 +234,7 @@ In order for the controller-manager to sign certificates, it needs the following
234234
235235
### Access to key and certificate
236236
237-
As described earlier, you need to create a Kubernetes CA key and certificate, and distribute it to the master nodes.
237+
As described earlier, you need to create a Kubernetes CA key and certificate, and distribute it to the control plane nodes.
238238
These will be used by the controller-manager to sign the kubelet certificates.
239239
240240
Since these signed certificates will, in turn, be used by the kubelet to authenticate as a regular kubelet to kube-apiserver, it is important that the CA
@@ -319,7 +319,7 @@ collection.
319319

320320
## kubelet configuration
321321

322-
Finally, with the master nodes properly set up and all of the necessary authentication and authorization in place, we can configure the kubelet.
322+
Finally, with the control plane nodes properly set up and all of the necessary authentication and authorization in place, we can configure the kubelet.
323323

324324
The kubelet requires the following configuration to bootstrap:
325325

0 commit comments

Comments
 (0)