Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 27 for certificate (0.21 sec)

  1. CHANGELOG/CHANGELOG-1.17.md

    Prior to 1.17 and for existing nodes created by `kubeadm init` where kubelet client certificate rotation is desired, you must modify `/etc/kubernetes/kubelet.conf` to point to the PEM symlink for rotation:
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Thu Jan 28 10:44:33 UTC 2021
    - 346.2K bytes
    - Viewed (1)
  2. CHANGELOG/CHANGELOG-1.18.md

    - Added two client certificate metrics for exec auth:
        - `rest_client_certificate_expiration_seconds` a gauge reporting the lifetime of the current client certificate. Reports the time of expiry in seconds since January 1, 1970 UTC.
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Wed Jun 16 17:18:28 UTC 2021
    - 373.2K bytes
    - Viewed (0)
  3. CHANGELOG/CHANGELOG-1.29.md

    - Fixed an issue where the `vsphere` cloud provider would not trust a certificate if:
      - The issuer of the certificate was unknown (`x509.UnknownAuthorityError`)
      - The requested name did not match the set of authorized names (`x509.HostnameError`)
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Wed Oct 23 04:37:31 UTC 2024
    - 375.1K bytes
    - Viewed (1)
  4. CHANGELOG/CHANGELOG-1.15.md

    ### Cluster Lifecycle
    
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Thu May 05 13:44:43 UTC 2022
    - 278.9K bytes
    - Viewed (0)
  5. CHANGELOG/CHANGELOG-1.14.md

    Kubeadm: Automate certificate copy between control planes in HA setups
    
    - Joining control plane nodes to a HA cluster can now be simplified by enabling the optional automatic copy of certificates from an existing control plane node.
    - You can now use `kubeadm init --experimental-upload-certs` and `kubeadm join --experimental-control-plane --certificate-key`.
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Mon Jun 14 22:06:39 UTC 2021
    - 271.5K bytes
    - Viewed (0)
  6. CHANGELOG/CHANGELOG-1.8.md

            * requests from a node for a TLS serving certificate for itself are approved if the CSR creator has `create` permission on the `certificatesigningrequests` resource and the `selfnodeserver` subresource in the `certificates.k8s.io` API group
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Tue Feb 20 15:45:02 UTC 2024
    - 312.2K bytes
    - Viewed (0)
  7. CHANGELOG/CHANGELOG-1.12.md

      - Some kubeadm commands are now allowed to work in a completely offline mode.
    - Certificate handling improvements:
      - Renew certs as part of upgrade.
      - New `kubeadm alpha phase certs renew` command for renewing certificates.
      - Certificates created with kubeadm now have improved uniqueness of Distinguished Name fields.
    - HA improvements:
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Thu Feb 06 06:04:15 UTC 2020
    - 293.8K bytes
    - Viewed (0)
  8. CHANGELOG/CHANGELOG-1.7.md

            * requests from a node for a TLS serving certificate for itself are approved if the CSR creator has `create` permission on the `certificatesigningrequests` resource and the `selfnodeserver` subresource in the `certificates.k8s.io` API group
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Thu May 05 13:44:43 UTC 2022
    - 308.7K bytes
    - Viewed (1)
  9. CHANGELOG/CHANGELOG-1.9.md

    * Allows extension API server to dynamically discover the requestheader CA certificate when the core API server doesn't use certificate based authentication for it's clients ([#66394](https://github.com/kubernetes/kubernetes/pull/66394), [@rtripat](https://github.com/rtripat))
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Tue Nov 16 10:46:27 UTC 2021
    - 313.7K bytes
    - Viewed (0)
  10. CHANGELOG/CHANGELOG-1.11.md

    previously created the first bootstrap client credentials in the certificates directory as `kubelet-client.key` and `kubelet-client.crt`.  Subsequent certificates created by cert rotation were created in a combined PEM file that was atomically rotated as `kubelet-client-DATE.pem` in that directory, which meant clients relying on the `node.kubeconfig` generated by bootstrapping would never use a rotated cert.  The initial bootstrap certificate is now generated into the cert directory as a PEM file and symlinked...
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Thu Feb 06 06:04:15 UTC 2020
    - 328.4K bytes
    - Viewed (0)
Back to top