Certificates¶
Note
Before we can continue here, we need to have our nodes up and running with their external ip addresses and our fixed public ip address. This is because some certificates require these external ip addresses!
We need to create a whole lot of certificates, listed below, with the help of cfssl. A tool from CDN provider CloudFlare.
Required certificates¶
- CA (or Certificate Authority): will be the root certificate of our trust chain
- result:
ca.pem
&ca-key.pem
- result:
- Admin: the admin of our cluster (you!)
- result:
admin-key.pem
&admin.pem
- result:
- Kubelet: the certificates of the kubelet processes on the worker nodes
- result:
- Controller Manager
- result:
kube-controller-manager-key.pem
&kube-controller-manager.pem
- result:
- Scheduler
- result:
kube-scheduler-key.pem
&kube-scheduler.pem
- result:
- API Server
- result
kubernetes-key.pem
&kubernetes.pem
- result
- Service Account: ???
- result:
service-account-key.pem
&service-account.pem
- result:
Certificate example¶
Because we will use the cfssl
tool from CloudFlare, we will define our certificate signing request (CSR's) in json.
{
"CN": "service-accounts",
"key": {
"algo": "rsa",
"size": 2048
},
"names": [
{
"C": "NL",
"L": "Utrecht",
"O": "Kubernetes",
"OU": "Kubernetes The Hard Way",
"ST": "Utrecht"
}
]
}
Install scripts¶
Make sure you're in k8s-the-hard-way/scripts
Last update: 2019-08-31 13:29:28