Kubelet should use TLS certificate client authentication

Set up the kubernetes integration.

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Description

Kubelet authentication should use certificates. The connections from the API server to the kubelet are used for fetching logs for pods, attaching (through kubectl) to running pods, and using the kubelet’s port-forwarding functionality. These connections terminate at the kubelet’s HTTPS endpoint.

Remediation

  1. If using a Kubelet config file, edit the file to set authentication: x509: clientCAFile to the location of the client CA file.
  2. If using command line arguments, edit the kubelet service file /etc/systemd/system/kubelet.service.d/10-kubeadm.conf on each worker node and set the below parameter in the KUBELET_AUTHZ_ARGS variable.
--client-ca-file=<path/to/client-ca-file>
  1. Restart the kubelet service.
PREVIEWING: esther/docs-9518-update-example-control-sensitive-log-data