You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Nodes should be provisioned with the public root certificate for the cluster such that they can connect securely to the apiserver along with valid client credentials. A good approach is that the client credentials provided to the kubelet are in the form of a client certificate. See [kubelet TLS bootstrapping](/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/) for automated provisioning of kubelet client certificates.
@@ -52,12 +52,12 @@ The `kubernetes` service (in `default` namespace) is configured with a virtual I
52
52
53
53
The control plane components also communicate with the cluster apiserver over the secure port.
54
54
-->
55
-
想要连接到 apiserver 的 Pod 可以使用服务账号安全地进行连接。
55
+
想要连接到 API 服务器的 Pod 可以使用服务账号安全地进行连接。
56
56
当 Pod 被实例化时,Kubernetes 自动把公共根证书和一个有效的持有者令牌注入到 Pod 里。
57
57
`kubernetes` 服务(位于 `default` 名字空间中)配置了一个虚拟 IP 地址,用于(通过 kube-proxy)转发
58
-
请求到 apiserver 的 HTTPS 末端。
58
+
请求到 API 服务器的 HTTPS 末端。
59
59
60
-
控制面组件也通过安全端口与集群的 apiserver 通信。
60
+
控制面组件也通过安全端口与集群的 API 服务器通信。
61
61
62
62
<!--
63
63
As a result, the default operating mode for connections from the nodes and pods running on the nodes to the control plane is secured by default and can run over untrusted and/or public networks.
@@ -72,9 +72,9 @@ There are two primary communication paths from the control plane (apiserver) to
72
72
-->
73
73
## 控制面到节点
74
74
75
-
从控制面(apiserver)到节点有两种主要的通信路径。
76
-
第一种是从 apiserver 到集群中每个节点上运行的 kubelet 进程。
77
-
第二种是从 apiserver 通过它的代理功能连接到任何节点、Pod 或者服务。
75
+
从控制面(API 服务器)到节点有两种主要的通信路径。
76
+
第一种是从 API 服务器到集群中每个节点上运行的 kubelet 进程。
77
+
第二种是从 API 服务器通过它的代理功能连接到任何节点、Pod 或者服务。
78
78
79
79
<!--
80
80
### apiserver to kubelet
@@ -89,14 +89,14 @@ These connections terminate at the kubelet's HTTPS endpoint. By default, the api
@@ -107,10 +107,10 @@ untrusted or public network.
107
107
108
108
Finally, [Kubelet authentication and/or authorization](/docs/reference/command-line-tools-reference/kubelet-authentication-authorization/) should be enabled to secure the kubelet API.
The connections from the apiserver to a node, pod, or service default to plain HTTP connections and are therefore neither authenticated nor encrypted. They can be run over a secure HTTPS connection by prefixing `https:` to the node, pod, or service name in the API URL, but they will not validate the certificate provided by the HTTPS endpoint nor provide client credentials so while the connection will be encrypted, it will not provide any guarantees of integrity. These connections **are not currently safe** to run over untrusted and/or public networks.
0 commit comments