Skip to content

Commit 959cb92

Browse files
committed
Integrate flags into "Transport security" section
1 parent c5d8916 commit 959cb92

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

content/en/docs/concepts/security/controlling-access.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,10 +22,11 @@ following diagram:
2222

2323
## Transport security
2424

25-
In a typical Kubernetes cluster, the API serves on port 443, protected by TLS.
25+
By default, the Kubernetes API server listens on port 6443 on the first non-localhost network interface, protected by TLS. In a typical production Kubernetes cluster, the API serves on port 443. The port can be changed with the `--secure-port`, and the listening IP address with the `--bind-address` flag.
26+
2627
The API server presents a certificate. This certificate may be signed using
2728
a private certificate authority (CA), or based on a public key infrastructure linked
28-
to a generally recognized CA.
29+
to a generally recognized CA. The certificate and corresponding private key can be set by using the `--tls-cert-file` and `--tls-private-key-file` flags.
2930

3031
If your cluster uses a private certificate authority, you need a copy of that CA
3132
certificate configured into your `~/.kube/config` on the client, so that you can

0 commit comments

Comments
 (0)