You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/zh/docs/reference/command-line-tools-reference/kube-apiserver.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -96,7 +96,8 @@ the host's default interface will be used.
96
96
The map from metric-label to value allow-list of this label. The key's format is <MetricName>,<LabelName>. The value's format is <allowed_value>,<allowed_value>...e.g. metric1,label1='v1,v2,v3', metric1,label2='v1,v2,v3' metric2,label1='v1,v2,v3'.
Copy file name to clipboardExpand all lines: content/zh/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping.md
+17-14Lines changed: 17 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -299,8 +299,7 @@ A kubelet authenticating using bootstrap tokens is authenticated as a user in th
299
299
<!--
300
300
As this feature matures, you
301
301
should ensure tokens are bound to a Role Based Access Control (RBAC) policy
302
-
which limits requests (using the [bootstrap
303
-
token](/docs/reference/access-authn-authz/bootstrap-tokens/)) strictly to client
302
+
which limits requests (using the [bootstrap token](/docs/reference/access-authn-authz/bootstrap-tokens/)) strictly to client
304
303
requests related to certificate provisioning. With RBAC in place, scoping the
305
304
tokens to a group allows for great flexibility. For example, you could disable a
306
305
particular bootstrap group's access when you are done provisioning the nodes.
@@ -335,7 +334,7 @@ The process is two-fold:
335
334
336
335
<!--
337
336
From the kubelet's perspective, one token is like another and has no special meaning.
338
-
From the kube-apiserver's perspective, however, the bootstrap token is special. Due to its `Type`, `namespace` and `name`, kube-apiserver recognizes it as a special token,
337
+
From the kube-apiserver's perspective, however, the bootstrap token is special. Due to its `type`, `namespace` and `name`, kube-apiserver recognizes it as a special token,
339
338
and grants anyone authenticating with that token special bootstrap rights, notably treating them as a member of the `system:bootstrappers` group. This fulfills a basic requirement
340
339
for TLS bootstrapping.
341
340
-->
@@ -354,7 +353,7 @@ If you want to use bootstrap tokens, you must enable it on kube-apiserver with t
354
353
355
354
如果你希望使用启动引导令牌,你必须在 kube-apiserver 上使用下面的标志启用之:
356
355
357
-
```
356
+
```console
358
357
--enable-bootstrap-token-auth=true
359
358
```
360
359
@@ -373,7 +372,7 @@ kube-apiserver 能够将令牌视作身份认证依据。
373
372
至少 128 位混沌数据。这里的随机数生成器可以是现代 Linux 系统上的
374
373
`/dev/urandom`。生成令牌的方式有很多种。例如:
375
374
376
-
```
375
+
```shell
377
376
head -c 16 /dev/urandom | od -An -t x | tr -d ''
378
377
```
379
378
@@ -388,7 +387,7 @@ values can be anything and the quoted group name should be as depicted:
Now that the bootstrapping node is _authenticated_ as part of the `system:bootstrappers` group, it needs to be _authorized_ to create a certificate signing request (CSR) as well as retrieve it when done. Fortunately, Kubernetes ships with a `ClusterRole` with precisely these (and just these) permissions, `system:node-bootstrapper`.
408
+
Now that the bootstrapping node is _authenticated_ as part of the
409
+
`system:bootstrappers` group, it needs to be _authorized_ to create a
410
+
certificate signing request (CSR) as well as retrieve it when done.
411
+
Fortunately, Kubernetes ships with a `ClusterRole` with precisely these (and
412
+
only these) permissions, `system:node-bootstrapper`.
410
413
411
-
To do this, you just need to create a `ClusterRoleBinding` that binds the `system:bootstrappers` group to the cluster role `system:node-bootstrapper`.
414
+
To do this, you only need to create a `ClusterRoleBinding` that binds the `system:bootstrappers` group to the cluster role `system:node-bootstrapper`.
Copy file name to clipboardExpand all lines: content/zh/docs/reference/command-line-tools-reference/kubelet.md
+13-12Lines changed: 13 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,13 +8,15 @@ weight: 28
8
8
9
9
10
10
<!--
11
-
The kubelet is the primary "node agent" that runs on each node. It can register the node with the apiserver using one of: the hostname; a flag to override the hostname; or specific logic for a cloud provider.
11
+
The kubelet is the primary "node agent" that runs on each
12
+
node. It can register the node with the apiserver using one of: the hostname; a flag to override the hostname; or specific logic for a cloud provider.
The kubelet works in terms of a PodSpec. A PodSpec is a YAML or JSON object that describes a pod. The kubelet takes a set of PodSpecs that are provided through various mechanisms (primarily through the apiserver) and ensures that the containers described in those PodSpecs are running and healthy. The kubelet doesn't manage containers which were not created by Kubernetes.
18
+
The kubelet works in terms of a PodSpec. A PodSpec is a YAML or JSON object
19
+
that describes a pod. The kubelet takes a set of PodSpecs that are provided through various mechanisms (primarily through the apiserver) and ensures that the containers described in those PodSpecs are running and healthy. The kubelet doesn't manage containers which were not created by Kubernetes.
<Warning: Beta feature> Set the maximum number of container log files that can be present for a container. The number must be ≥ 2. This flag can only be used with `--container-runtime=remote`. (DEPRECATED: This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.)
436
+
Set the maximum number of container log files that can be present for a container. The number must be ≥ 2. This flag can only be used with `--container-runtime=remote`. (DEPRECATED: This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.)
<Warning: Beta feature> Set the maximum size (e.g. 10Mi) of container log file before it is rotated. This flag can only be used with `--container-runtime=remote`. (DEPRECATED: This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.)
451
+
Set the maximum size (e.g. 10Mi) of container log file before it is rotated. This flag can only be used with `--container-runtime=remote`. (DEPRECATED: This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.)
The image whose network/IPC namespaces containers in each pod will use. This docker-specific flag only works when container-runtime is set to `docker`.
1816
+
Specified image will not be pruned by the image garbage collector. When container-runtime is set to `docker`, all containers in each pod will use the network/ipc namespaces from this image. Other CRI implementations have their own configuration to set this image.
0 commit comments