Skip to content

Commit c1693b5

Browse files
committed
Unify typical apiserver port in docs
1 parent 5750f06 commit c1693b5

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

content/en/docs/concepts/architecture/control-plane-node-communication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ This document catalogs the communication paths between the control plane (really
1919
{{% capture body %}}
2020

2121
## Node to Control Plane
22-
All communication paths from the nodes to the control plane terminate at the apiserver (none of the other master components are designed to expose remote services). In a typical deployment, the apiserver is configured to listen for remote connections on a secure HTTPS port (443) with one or more forms of client [authentication](/docs/reference/access-authn-authz/authentication/) enabled.
22+
Kubernetes has a "hub-and-spoke" API pattern. All API usage from nodes (or the pods they run) terminate at the apiserver (none of the other control plane components are designed to expose remote services). The apiserver is configured to listen for remote connections on a secure HTTPS port (typically 443) with one or more forms of client [authentication](/docs/reference/access-authn-authz/authentication/) enabled.
2323
One or more forms of [authorization](/docs/reference/access-authn-authz/authorization/) should be enabled, especially if [anonymous requests](/docs/reference/access-authn-authz/authentication/#anonymous-requests) or [service account tokens](/docs/reference/access-authn-authz/authentication/#service-account-tokens) are allowed.
2424

2525
Nodes should be provisioned with the public root certificate for the cluster such that they can connect securely to the apiserver along with valid client credentials. For example, on a default GKE deployment, the client credentials provided to the kubelet are in the form of a client certificate. See [kubelet TLS bootstrapping](/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/) for automated provisioning of kubelet client certificates.

content/en/docs/reference/access-authn-authz/controlling-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ following diagram:
2323

2424
## Transport Security
2525

26-
In a typical Kubernetes cluster, the API serves on port 6443.
26+
In a typical Kubernetes cluster, the API serves on port 443.
2727
The API server presents a certificate. This certificate is
2828
often self-signed, so `$USER/.kube/config` on the user's machine typically
2929
contains the root certificate for the API server's certificate, which when specified

0 commit comments

Comments
 (0)