Pods should use `root-ca-file` to pass serving certificates to the API server

Set up the kubernetes integration.

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Description

Pods should be allowed to verify the API server’s serving certificate before establishing connections. Processes running in pods that need to contact the API server must verify the API server’s serving certificate. Failure to do so could result in the pod being subject to man-in-the-middle attacks.

Remediation

Edit the Controller Manager pod specification file /etc/kubernetes/manifests/kube-controller-manager.yaml on the master node and set the --root-ca-file parameter to the certificate bundle file: --root-ca-file=<path/to/file>

PREVIEWING: dgreen15/adding-custom-entities