Skip to content

Commit a3ea9f4

Browse files
committed
Update references to the kubelet security files
This commit updates all the existing references to the files move in the previous commit.
1 parent 89b0b1b commit a3ea9f4

File tree

12 files changed

+19
-22
lines changed

12 files changed

+19
-22
lines changed

content/en/docs/concepts/architecture/control-plane-node-communication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ This document catalogs the communication paths between the control plane (apiser
2121
Kubernetes has a "hub-and-spoke" API pattern. All API usage from nodes (or the pods they run) terminates at the apiserver. None of the other control plane components are designed to expose remote services. The apiserver is configured to listen for remote connections on a secure HTTPS port (typically 443) with one or more forms of client [authentication](/docs/reference/access-authn-authz/authentication/) enabled.
2222
One or more forms of [authorization](/docs/reference/access-authn-authz/authorization/) should be enabled, especially if [anonymous requests](/docs/reference/access-authn-authz/authentication/#anonymous-requests) or [service account tokens](/docs/reference/access-authn-authz/authentication/#service-account-tokens) are allowed.
2323

24-
Nodes should be provisioned with the public root certificate for the cluster such that they can connect securely to the apiserver along with valid client credentials. A good approach is that the client credentials provided to the kubelet are in the form of a client certificate. See [kubelet TLS bootstrapping](/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/) for automated provisioning of kubelet client certificates.
24+
Nodes should be provisioned with the public root certificate for the cluster such that they can connect securely to the apiserver along with valid client credentials. A good approach is that the client credentials provided to the kubelet are in the form of a client certificate. See [kubelet TLS bootstrapping](/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/) for automated provisioning of kubelet client certificates.
2525

2626
Pods that wish to connect to the apiserver can do so securely by leveraging a service account so that Kubernetes will automatically inject the public root certificate and a valid bearer token into the pod when it is instantiated.
2727
The `kubernetes` service (in `default` namespace) is configured with a virtual IP address that is redirected (via kube-proxy) to the HTTPS endpoint on the apiserver.
@@ -49,7 +49,7 @@ To verify this connection, use the `--kubelet-certificate-authority` flag to pro
4949
If that is not possible, use [SSH tunneling](#ssh-tunnels) between the apiserver and kubelet if required to avoid connecting over an
5050
untrusted or public network.
5151

52-
Finally, [Kubelet authentication and/or authorization](/docs/reference/command-line-tools-reference/kubelet-authentication-authorization/) should be enabled to secure the kubelet API.
52+
Finally, [Kubelet authentication and/or authorization](/docs/reference/access-authn-authz/kubelet-authn-authz/) should be enabled to secure the kubelet API.
5353

5454
### apiserver to nodes, pods, and services
5555

content/en/docs/concepts/cluster-administration/_index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -63,8 +63,8 @@ Before choosing a guide, here are some considerations:
6363

6464
### Securing the kubelet
6565
* [Control Plane-Node communication](/docs/concepts/architecture/control-plane-node-communication/)
66-
* [TLS bootstrapping](/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/)
67-
* [Kubelet authentication/authorization](/docs/reference/command-line-tools-reference/kubelet-authentication-authorization/)
66+
* [TLS bootstrapping](/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/)
67+
* [Kubelet authentication/authorization](/docs/reference/acess-authn-authz/kubelet-authn-authz/)
6868

6969
## Optional Cluster Services
7070

content/en/docs/reference/access-authn-authz/bootstrap-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ creating new clusters or joining new nodes to an existing cluster. It was built
1515
to support [kubeadm](/docs/reference/setup-tools/kubeadm/), but can be used in other contexts
1616
for users that wish to start clusters without `kubeadm`. It is also built to
1717
work, via RBAC policy, with the
18-
[Kubelet TLS Bootstrapping](/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/) system.
18+
[Kubelet TLS Bootstrapping](/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/) system.
1919

2020

2121
<!-- body -->

content/en/docs/reference/access-authn-authz/node.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ have the minimal set of permissions required to operate correctly.
4343
In order to be authorized by the Node authorizer, kubelets must use a credential that identifies them as
4444
being in the `system:nodes` group, with a username of `system:node:<nodeName>`.
4545
This group and user name format match the identity created for each kubelet as part of
46-
[kubelet TLS bootstrapping](/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/).
46+
[kubelet TLS bootstrapping](/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/).
4747

4848
The value of `<nodeName>` **must** match precisely the name of the node as registered by the kubelet. By default, this is the host name as provided by `hostname`, or overridden via the [kubelet option](/docs/reference/command-line-tools-reference/kubelet/) `--hostname-override`. However, when using the `--cloud-provider` kubelet option, the specific hostname may be determined by the cloud provider, ignoring the local `hostname` and the `--hostname-override` option.
4949
For specifics about how the kubelet determines the hostname, see the [kubelet options reference](/docs/reference/command-line-tools-reference/kubelet/).

content/en/docs/reference/access-authn-authz/rbac.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -798,7 +798,7 @@ This is commonly used by add-on API servers for unified authentication and autho
798798
<td><b>system:node-bootstrapper</b></td>
799799
<td>None</td>
800800
<td>Allows access to the resources required to perform
801-
<a href="/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/">kubelet TLS bootstrapping</a>.</td>
801+
<a href="/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/">kubelet TLS bootstrapping</a>.</td>
802802
</tr>
803803
<tr>
804804
<td><b>system:node-problem-detector</b></td>

content/en/docs/reference/command-line-tools-reference/feature-gates.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1028,10 +1028,10 @@ Each feature gate is designed for enabling/disabling a specific feature:
10281028
[Bound Service Account Tokens](https://github.com/kubernetes/enhancements/blob/master/keps/sig-auth/1205-bound-service-account-tokens/README.md)
10291029
for more details.
10301030
- `RotateKubeletClientCertificate`: Enable the rotation of the client TLS certificate on the kubelet.
1031-
See [kubelet configuration](/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/#kubelet-configuration)
1031+
See [kubelet configuration](/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/#kubelet-configuration)
10321032
for more details.
10331033
- `RotateKubeletServerCertificate`: Enable the rotation of the server TLS certificate on the kubelet.
1034-
See [kubelet configuration](/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/#kubelet-configuration)
1034+
See [kubelet configuration](/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/#kubelet-configuration)
10351035
for more details.
10361036
- `RunAsGroup`: Enable control over the primary group ID set on the init
10371037
processes of containers.

content/en/docs/reference/setup-tools/kubeadm/implementation-details.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -224,7 +224,7 @@ Other API server flags that are set unconditionally are:
224224

225225
- `--insecure-port=0` to avoid insecure connections to the api server
226226
- `--enable-bootstrap-token-auth=true` to enable the `BootstrapTokenAuthenticator` authentication module.
227-
See [TLS Bootstrapping](/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/) for more details
227+
See [TLS Bootstrapping](/docs/reference/access-authn-authn/kubelet-tls-bootstrapping/) for more details
228228
- `--allow-privileged` to `true` (required e.g. by kube proxy)
229229
- `--requestheader-client-ca-file` to `front-proxy-ca.crt`
230230
- `--enable-admission-plugins` to:
@@ -271,7 +271,7 @@ The static Pod manifest for the controller manager is affected by following para
271271
Other flags that are set unconditionally are:
272272

273273
- `--controllers` enabling all the default controllers plus `BootstrapSigner` and `TokenCleaner` controllers for TLS bootstrap.
274-
See [TLS Bootstrapping](/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/) for more details
274+
See [TLS Bootstrapping](/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/) for more details
275275
- `--use-service-account-credentials` to `true`
276276
- Flags for using certificates generated in previous steps:
277277
- `--root-ca-file` to `ca.crt`

content/en/docs/reference/setup-tools/kubeadm/kubeadm-init.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ following steps:
5252

5353
1. Makes all the necessary configurations for allowing node joining with the
5454
[Bootstrap Tokens](/docs/reference/access-authn-authz/bootstrap-tokens/) and
55-
[TLS Bootstrap](/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/)
55+
[TLS Bootstrap](/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/)
5656
mechanism:
5757

5858
- Write a ConfigMap for making available all the information required

content/en/docs/setup/best-practices/certificates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ This page explains the certificates that your cluster requires.
2222
Kubernetes requires PKI for the following operations:
2323

2424
* Client certificates for the kubelet to authenticate to the API server
25-
* Kubelet [server certificates](/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/#client-and-serving-certificates)
25+
* Kubelet [server certificates](/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/#client-and-serving-certificates)
2626
for the API server to talk to the kubelets
2727
* Server certificate for the API server endpoint
2828
* Client certificates for administrators of the cluster to authenticate to the API server

content/en/docs/tasks/administer-cluster/kubeadm/kubeadm-certs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -276,7 +276,7 @@ By default, these serving certificate will expire after one year. Kubeadm sets t
276276
`KubeletConfiguration` field `rotateCertificates` to `true`, which means that close
277277
to expiration a new set of CSRs for the serving certificates will be created and must
278278
be approved to complete the rotation. To understand more see
279-
[Certificate Rotation](/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/#certificate-rotation).
279+
[Certificate Rotation](/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/#certificate-rotation).
280280

281281
If you are looking for a solution for automatic approval of these CSRs it is recommended
282282
that you contact your cloud provider and ask if they have a CSR signer that verifies

content/en/docs/tasks/administer-cluster/securing-a-cluster.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -13,15 +13,10 @@ content_type: task
1313
This document covers topics related to protecting a cluster from accidental or malicious access
1414
and provides recommendations on overall security.
1515

16-
17-
1816
## {{% heading "prerequisites" %}}
1917

20-
2118
* {{< include "task-tutorial-prereqs.md" >}} {{< version-check >}}
2219

23-
24-
2520
<!-- steps -->
2621

2722
## Controlling access to the Kubernetes API
@@ -77,11 +72,13 @@ Consult the [authorization reference section](/docs/reference/access-authn-authz
7772

7873
## Controlling access to the Kubelet
7974

80-
Kubelets expose HTTPS endpoints which grant powerful control over the node and containers. By default Kubelets allow unauthenticated access to this API.
75+
Kubelets expose HTTPS endpoints which grant powerful control over the node and containers.
76+
By default Kubelets allow unauthenticated access to this API.
8177

8278
Production clusters should enable Kubelet authentication and authorization.
8379

84-
Consult the [Kubelet authentication/authorization reference](/docs/reference/command-line-tools-reference/kubelet-authentication-authorization) for more information.
80+
Consult the [Kubelet authentication/authorization reference](/docs/reference/access-authn-authz/kubelet-authn-authz/)
81+
for more information.
8582

8683
## Controlling the capabilities of a workload or user at runtime
8784

content/en/docs/tasks/tls/certificate-rotation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ default, these certificates are issued with one year expiration so that they do
2828
not need to be renewed too frequently.
2929

3030
Kubernetes contains [kubelet certificate
31-
rotation](/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/),
31+
rotation](/docs/reference/access-authn-authz/kubelet-tls-bootstrapping/),
3232
that will automatically generate a new key and request a new certificate from
3333
the Kubernetes API as the current certificate approaches expiration. Once the
3434
new certificate is available, it will be used for authenticating connections to

0 commit comments

Comments
 (0)