Skip to content

Commit 9ff4544

Browse files
authored
Merge pull request #25559 from jiaj12/patch-63
Update kubeadm-certs.md
2 parents f9d00a0 + 239fcf6 commit 9ff4544

File tree

1 file changed

+65
-48
lines changed

1 file changed

+65
-48
lines changed

content/zh/docs/tasks/administer-cluster/kubeadm/kubeadm-certs.md

Lines changed: 65 additions & 48 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,7 @@ reviewers:
88
- sig-cluster-lifecycle
99
title: Certificate Management with kubeadm
1010
content_type: task
11+
weight: 10
1112
-->
1213

1314
<!-- overview -->
@@ -30,27 +31,28 @@ You should be familiar with [PKI certificates and requirements in Kubernetes](/d
3031
<!-- steps -->
3132

3233
<!--
33-
### Using custom certificates {#custom-certificates}
34+
## Using custom certificates {#custom-certificates}
3435
3536
By default, kubeadm generates all the certificates needed for a cluster to run.
3637
You can override this behavior by providing your own certificates.
3738
-->
38-
### 使用自定义的证书 {#custom-certificates}
39+
40+
## 使用自定义的证书 {#custom-certificates}
3941

4042
默认情况下, kubeadm 会生成运行一个集群所需的全部证书。
4143
你可以通过提供你自己的证书来改变这个行为策略。
4244

4345
<!--
4446
To do so, you must place them in whatever directory is specified by the
45-
`--cert-dir` flag or `CertificatesDir` configuration file key. By default this
47+
`--cert-dir` flag or the `CertificatesDir`field of kubeadm's `ClusterConfiguration` . By default this
4648
is `/etc/kubernetes/pki`.
4749
-->
48-
如果要这样做, 你必须将证书文件放置在通过 `--cert-dir` 命令行参数或者配置文件里的
50+
如果要这样做, 你必须将证书文件放置在通过 `--cert-dir` 命令行参数或者 kubeadm 配置中的
4951
`CertificatesDir` 配置项指明的目录中。默认的值是 `/etc/kubernetes/pki`
5052

5153
<!--
5254
If a given certificate and private key pair exists before running `kubeadm init`,
53-
kubeadm will not overwrite them. This means you can, for example, copy an existing
55+
kubeadm does not overwrite them. This means you can, for example, copy an existing
5456
CA into `/etc/kubernetes/pki/ca.crt` and `/etc/kubernetes/pki/ca.key`,
5557
and kubeadm will use this CA for signing the rest of the certificates.
5658
-->
@@ -59,26 +61,32 @@ and kubeadm will use this CA for signing the rest of the certificates.
5961
`/etc/kubernetes/pki/ca.key` 中,而 kubeadm 将使用此 CA 对其余证书进行签名。
6062

6163
<!--
62-
#### External CA mode {#external-ca-mode}
64+
65+
## External CA mode {#external-ca-mode}
6366
6467
It is also possible to provide just the `ca.crt` file and not the
6568
`ca.key` file (this is only available for the root CA file, not other cert pairs).
6669
If all other certificates and kubeconfig files are in place, kubeadm recognizes
67-
this condition and activates the "External CA" mode. kubeadm will proceed without the
68-
CA key on disk.
70+
this condition and activates the "External CA" mode. kubeadm will proceed without the CA key on disk.
6971
-->
70-
#### 外部 CA 模式 {#external-ca-mode}
7172

72-
只提供了 `ca.crt` 文件但是不提供 `ca.key` 文件也是可以的 (这只对 CA 根证书可用,其它证书不可用)。
73+
## 外部 CA 模式 {#external-ca-mode}
74+
75+
只提供了 `ca.crt` 文件但是不提供 `ca.key` 文件也是可以的(这只对 CA 根证书可用,其它证书不可用)。
7376
如果所有的其它证书和 kubeconfig 文件已就绪, kubeadm 检测到满足以上条件就会激活
7477
"外部 CA" 模式。kubeadm 将会在没有 CA 密钥文件的情况下继续执行。
7578

7679
<!--
7780
Instead, run the controller-manager standalone with `--controllers=csrsigner` and
7881
point to the CA certificate and key.
7982
-->
80-
否则, kubeadm 将独立运行 controller-manager,附加一个 `--controllers=csrsigner`
81-
的参数,并且指明 CA 证书和密钥。
83+
否则, kubeadm 将独立运行 controller-manager,附加一个 `--controllers=csrsigner` 的参数,并且指明 CA 证书和密钥。
84+
85+
<!--
86+
[PKI certificates and requirements](/docs/setup/best-practices/certificates/) includes guidance on
87+
setting up a cluster to use an external CA.
88+
-->
89+
[PKI证书和要求](/zh/docs/setup/best-practices/certificates/)包括集群使用外部CA的设置指南。
8290

8391
<!--
8492
[PKI certificates and requirements](/docs/setup/best-practices/certificates/) includes guidance on
@@ -89,17 +97,19 @@ setting up a cluster to use an external CA.
8997
<!--
9098
## Check certificate expiration
9199
92-
You can use the `check-expiration` subcommand to check certificate expiration.
100+
You can use the `check-expiration` subcommand to check when certificates expire:
93101
-->
94102
## 检查证书是否过期
95103

96-
你可以使用 `check-expiration` 子命令来检查证书是否过期
104+
你可以使用 `check-expiration` 子命令来检查证书何时过期
97105

98106
```shell
99107
kubeadm alpha certs check-expiration
100-
```
108+
```
101109

102-
<!-- The output is similar to this: -->
110+
<!--
111+
The output is similar to this:
112+
-->
103113
输出类似于以下内容:
104114

105115
```
@@ -124,8 +134,9 @@ front-proxy-ca Dec 28, 2029 23:36 UTC 9y no
124134
<!--
125135
The command shows expiration/residual time for the client certificates in the `/etc/kubernetes/pki` folder and for the client certificate embedded in the KUBECONFIG files used by kubeadm (`admin.conf`, `controller-manager.conf` and `scheduler.conf`).
126136
-->
127-
该命令显示 `/etc/kubernetes/pki` 文件夹中的客户端证书以及 kubeadm 使用的 KUBECONFIG
128-
文件中嵌入的客户端证书的到期时间/剩余时间。
137+
该命令显示 `/etc/kubernetes/pki` 文件夹中的客户端证书以及
138+
kubeadm(`admin.conf`, `controller-manager.conf``scheduler.conf`
139+
使用的 KUBECONFIG 文件中嵌入的客户端证书的到期时间/剩余时间。
129140

130141
<!--
131142
Additionally, kubeadm informs the user if the certificate is externally managed; in this case, the user should take care of managing certificate renewal manually/using other tools.
@@ -135,9 +146,9 @@ Additionally, kubeadm informs the user if the certificate is externally managed;
135146

136147
<!--
137148
`kubeadm` cannot manage certificates signed by an external CA.
138-
-->`
149+
-->
139150
{{< warning >}}
140-
kubeadm` 不能管理由外部 CA 签名的证书
151+
`kubeadm` 不能管理由外部 CA 签名的证书
141152
{{< /warning >}}
142153

143154
<!--
@@ -171,6 +182,7 @@ client-key: /var/lib/kubelet/pki/kubelet-client-current.pem
171182
172183
`kubeadm` renews all the certificates during control plane [upgrade](/docs/tasks/administer-cluster/kubeadm/kubeadm-upgrade-1-15/).
173184
-->
185+
174186
## 自动更新证书
175187

176188
`kubeadm` 会在控制面
@@ -230,24 +242,29 @@ If you are running an HA cluster, this command needs to be executed on all the c
230242
如果你运行了一个 HA 集群,这个命令需要在所有控制面板节点上执行。
231243
{{< /warning >}}
232244

233-
<!-- `alpha certs renew` uses the existing certificates as the authoritative source for attributes (Common Name, Organization, SAN, etc.) instead of the kubeadm-config ConfigMap. It is strongly recommended to keep them both in sync. -->
245+
<!--
246+
` certs renew` uses the existing certificates as the authoritative source for attributes (Common Name, Organization, SAN, etc.) instead of the kubeadm-config ConfigMap. It is strongly recommended to keep them both in sync.
247+
-->
234248
{{< note >}}
235-
`alpha certs renew` 使用现有的证书作为属性 (Common Name、Organization、SAN 等) 的权威来源,
249+
`certs renew` 使用现有的证书作为属性 (Common Name、Organization、SAN 等) 的权威来源,
236250
而不是 kubeadm-config ConfigMap 。强烈建议使它们保持同步。
237251
{{< /note >}}
238252

253+
<!--
254+
`kubeadm alpha certs renew` provides the following options:
255+
-->
256+
`kubeadm certs renew`提供以下选项:
257+
239258
<!--
240259
The Kubernetes certificates normally reach their expiration date after one year.
241260
-->
242261
Kubernetes 证书通常在一年后到期。
243262

244263
<!--
245-
`kubeadm alpha certs renew` provides the following options:
246264

247265
- `--csr-only` can be used to renew certificats with an external CA by generating certificate signing requests (without actually renewing certificates in place); see next paragraph for more information.
248266
- It's also possible to renew a single certificate instead of all.
249267
-->
250-
`kubeadm alpha certs renew` 提供下列选项
251268

252269
- `--csr-only` 可用于经过一个外部 CA 生成的证书签名请求来更新证书(无需实际替换更新证书);
253270
更多信息请参见下节。
@@ -274,10 +291,11 @@ These are advanced topics for users who need to integrate their organization's c
274291
### Set up a signer
275292

276293
The Kubernetes Certificate Authority does not work out of the box.
277-
You can configure an external signer such as [cert-manager][cert-manager-issuer], or you can use the build-in signer.
278-
The built-in signer is part of [`kube-controller-manager`][kcm].
279-
To activate the build-in signer, you pass the `--cluster-signing-cert-file` and `--cluster-signing-key-file` arguments.
294+
You can configure an external signer such as [cert-manager](https://docs.cert-manager.io/en/latest/tasks/issuers/setup-ca.html), or you can use the build-in signer.
295+
The built-in signer is part of [`kube-controller-manager`](/docs/reference/command-line-tools-reference/kube-controller-manager/).
296+
To activate the build-in signer, you must pass the `--cluster-signing-cert-file` and `--cluster-signing-key-file` flags.
280297
-->
298+
281299
### 设置一个签名者(Signer)
282300

283301
Kubernetes 证书颁发机构不是开箱即用。
@@ -287,19 +305,12 @@ Kubernetes 证书颁发机构不是开箱即用。
287305
内置签名者是
288306
[`kube-controller-manager`](/zh/docs/reference/command-line-tools-reference/kube-controller-manager/)
289307
的一部分。
290-
要激活内置签名者,请传递`--cluster-signing-cert-file` 和 `--cluster-signing-key-file`参数。
308+
要激活内置签名者,请传递 `--cluster-signing-cert-file` 和 `--cluster-signing-key-file` 参数。
291309

292310
<!--
293-
The built-in signer is part of [`kube-controller-manager`][kcm].
294-
To activate the build-in signer, you must pass the `--cluster-signing-cert-file` and `--cluster-signing-key-file` flags.
311+
If you're creating a new cluster, you can use a kubeadm [configuration file](https://godoc.org/k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm/v1beta2):
295312
-->
296-
这个内置签名者是 [`kube-controller-manager`][kcm] 的一部分。
297-
要激活内置签名者,必须传递 `--cluster-signing-cert-file` 和 `--cluster-signing-key-file` 参数。
298-
299-
<!--
300-
If you're creating a new cluster, you can use a kubeadm [configuration file][config]:
301-
-->
302-
如果你正在正在创建一个新的集群,你可以使用 kubeadm 的
313+
如果你正在创建一个新的集群,你可以使用 kubeadm 的
303314
[配置文件](https://godoc.org/k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm/v1beta2)。
304315

305316
```yaml
@@ -321,8 +332,8 @@ You can create the certificate signing requests for the Kubernetes certificates
321332
你可以用 `kubeadm alpha certs renew --use-api` 为 Kubernetes 证书 API 创建一个证书签名请求。
322333

323334
<!--
324-
If you set up an external signer such as [cert-manager][cert-manager], certificate signing requests (CSRs) are automatically approved.
325-
Otherwise, you must manually approve certificates with the [`kubectl certificate`][certs] command.
335+
If you set up an external signer such as [cert-manager](https://github.com/jetstack/cert-manager), certificate signing requests (CSRs) are automatically approved.
336+
Otherwise, you must manually approve certificates with the [`kubectl certificate`](/docs/setup/best-practices/certificates/) command.
326337
The following kubeadm command outputs the name of the certificate to approve, then blocks and waits for approval to occur:
327338
-->
328339
如果你设置例如 [cert-manager](https://github.com/jetstack/cert-manager)
@@ -335,7 +346,9 @@ The following kubeadm command outputs the name of the certificate to approve, th
335346
sudo kubeadm alpha certs renew apiserver --use-api &
336347
```
337348

338-
<!-- The output is similar to this: -->
349+
<!--
350+
The output is similar to this:
351+
-->
339352
输出类似于以下内容:
340353
```
341354
[1] 2890
@@ -347,8 +360,9 @@ sudo kubeadm alpha certs renew apiserver --use-api &
347360
348361
If you set up an external signer, certificate signing requests (CSRs) are automatically approved.
349362
350-
Otherwise, you must manually approve certificates with the [`kubectl certificate`][certs] command. e.g.
363+
Otherwise, you must manually approve certificates with the [`kubectl certificate`](/docs/setup/best-practices/certificates/) command. e.g.
351364
-->
365+
352366
### 批准证书签名请求 (CSR)
353367
354368
如果你设置了一个外部签名者, 证书签名请求 (CSRs) 会自动被批准。
@@ -361,7 +375,8 @@ kubectl certificate approve kubeadm-cert-kube-apiserver-ld526
361375
```
362376

363377
<!--
364-
The output is similar to this: -->
378+
The output is similar to this:
379+
-->
365380
输出类似于以下内容:
366381

367382
```
@@ -406,13 +421,13 @@ If `--csr-dir` is not specified, the default certificate directory (`/etc/kubern
406421

407422
CSR 和随附的私钥都在输出中给出。
408423
你可以传入一个带有 `--csr-dir` 的目录,将 CRS 输出到指定位置。
409-
如果未指定 `--csr-dir` ,则使用默认证书目录( `/etc/kubernetes/pki` )
424+
如果未指定 `--csr-dir` ,则使用默认证书目录`/etc/kubernetes/pki`
410425

411426
<!--
412-
Certificates can be renewed with `kubeadm alpha certs renew --csr-only`.
427+
Certificates can be renewed with `kubeadm certs renew --csr-only`.
413428
As with `kubeadm init`, an output directory can be specified with the `--csr-dir` flag.
414429
-->
415-
证书可以通过 `kubeadm alpha certs renew --csr-only` 来续订。
430+
证书可以通过 `kubeadm certs renew --csr-only` 来续订。
416431
`kubeadm init` 一样,可以使用 `--csr-dir` 标志指定一个输出目录。
417432

418433
CSR 签署证书后,必须将证书和私钥复制到 PKI 目录(默认情况下为 `/etc/kubernetes/pki`)。
@@ -426,8 +441,10 @@ CSR 中包含一个证书的名字,域和 IP,但是未指定用法。
426441
颁发证书时,CA 有责任指定[正确的证书用法](/zh/docs/setup/best-practices/certificates/#all-certificates)
427442

428443
<!--
429-
* In `openssl` this is done with the [`openssl ca` command][openssl-ca].
430-
* In `cfssl` you specify [usages in the config file][cfssl-usages]
444+
* In `openssl` this is done with the
445+
[`openssl ca` command](https://superuser.com/questions/738612/openssl-ca-keyusage-extension).
446+
* In `cfssl` you specify
447+
[usages in the config file](https://github.com/cloudflare/cfssl/blob/master/doc/cmd/cfssl.txt#L170).
431448
-->
432449
*`openssl` 中,这是通过
433450
[`openssl ca` 命令](https://superuser.com/questions/738612/openssl-ca-keyusage-extension)
@@ -453,4 +470,4 @@ For more information about manual rotation or replacement of CA, see [manual rot
453470
kubeadm 并不直接支持对 CA 证书的轮换或者替换。
454471

455472
关于手动轮换或者置换 CA 的更多信息,可参阅
456-
[手动轮换 CA 证书](/zh/docs/tasks/tls/manual-rotation-of-ca-certificates/)
473+
[手动轮换 CA 证书](/zh/docs/tasks/tls/manual-rotation-of-ca-certificates/)

0 commit comments

Comments
 (0)