Skip to content

Commit f233b9e

Browse files
authored
Merge pull request #96539 from lahinson/ocpbugs-57276-cp-4.15
[enterprise-4.15][OCPBUGS-57276]: Removing namespace from etcd client cert docs
2 parents a1cab57 + 7ae723b commit f233b9e

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

security/certificate_types_descriptions/etcd-certificates.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ These certificates are only managed by the system and are automatically rotated.
2323
etcd certificates are used for encrypted communication between etcd member peers, as well as encrypted client traffic. The following certificates are generated and used by etcd and other processes that communicate with etcd:
2424

2525
* Peer certificates: Used for communication between etcd members.
26-
* Client certificates: Used for encrypted server-client communication. Client certificates are currently used by the API server only, and no other service should connect to etcd directly except for the proxy. Client secrets (`etcd-client`, `etcd-metric-client`, `etcd-metric-signer`, and `etcd-signer`) are added to the `openshift-config`, `openshift-monitoring`, and `openshift-kube-apiserver` namespaces.
26+
* Client certificates: Used for encrypted server-client communication. Client certificates are currently used by the API server only, and no other service should connect to etcd directly except for the proxy. Client secrets (`etcd-client`, `etcd-metric-client`, `etcd-metric-signer`, and `etcd-signer`) are added to the `openshift-config` and `openshift-kube-apiserver` namespaces.
2727
* Server certificates: Used by the etcd server for authenticating client requests.
2828
* Metric certificates: All metric consumers connect to proxy with metric-client certificates.
2929

0 commit comments

Comments
 (0)