kubernetes
[!TIP]
kubernetes.ioadd/_printas suffix in the url, it will show pages into one page i.e.:


/etc/kubernetes/manifests
/etc/kubernetes/manifests[!TIP]
/etc/kubernetes/manifestsas the path where kubelet should look for static Pod manifests. Names of static Pod manifests are:
etcd.yaml
kube-apiserver.yaml
kube-controller-manager.yaml
kube-scheduler.yaml
/etc/kubernetes
/etc/kubernetes[!TIP]
important kubernetes cluster configurations
/etc/kubernetes/as the path where kubeconfig files with identities for control plane components are stored. Names of kubeconfig files are:
kubelet.conf(bootstrap-kubelet.conf during TLS bootstrap)
controller-manager.conf
scheduler.conf
admin.conffor the cluster admin and kubeadm itself
names of certificates and key files
[!TIP]
ca.crt,ca.keyfor the Kubernetes certificate authority
apiserver.crt,apiserver.keyfor the API server certificate
apiserver-kubelet-client.crt,apiserver-kubelet-client.keyfor the client certificate used by the API server to connect to the kubelets securely
sa.pub,sa.keyfor the key used by the controller manager when signing ServiceAccount
front-proxy-ca.crt,front-proxy-ca.keyfor the front proxy certificate authority
front-proxy-client.crt,front-proxy-client.keyfor the front proxy client
[!TIP]
apiserver-advertise-addressandapiserver-bind-portto bind to; if not provided, those value defaults to the IP address of the default network interface on the machine and port6443
service-cluster-ip-rangeto use for servicesIf an external etcd server is specified, the
etcd-serversaddress and related TLS settings (etcd-cafile,etcd-certfile,etcd-keyfile);
if an external etcd server is not be provided, a local etcd will be used ( via host network )
If a cloud provider is specified, the corresponding
--cloud-provideris configured, together with the--cloud-configpath if such file exists (this is experimental, alpha and will be removed in a future version)
other api server flags
--insecure-port=0to avoid insecure connections to the api server--enable-bootstrap-token-auth=trueto enable the BootstrapTokenAuthenticator authentication module. See TLS Bootstrapping for more details--allow-privilegedto true (required e.g. by kube proxy)--requestheader-client-ca-fileto front-proxy-ca.crt--enable-admission-pluginsto:NamespaceLifecyclee.g. to avoid deletion of system reserved namespacesLimitRangerandResourceQuotato enforce limits on namespacesServiceAccountto enforce service account automationPersistentVolumeLabelattaches region or zone labels to PersistentVolumes as defined by the cloud provider (This admission controller is deprecated and will be removed in a future version. It is not deployed by kubeadm by default with v1.9 onwards when not explicitly opting into using gce or aws as cloud providers)DefaultStorageClassto enforce default storage class on PersistentVolumeClaim objectsDefaultTolerationSecondsNodeRestrictionto limit what a kubelet can modify (e.g. only pods on this node)
--kubelet-preferred-address-typestoInternalIP,ExternalIP,Hostname; this makeskubectl logsand other API server-kubelet communication work in environments where the hostnames of the nodes aren't resolvableFlags for using certificates generated in previous steps:
--client-ca-filetoca.crt--tls-cert-filetoapiserver.crt--tls-private-key-filetoapiserver.key--kubelet-client-certificatetoapiserver-kubelet-client.crt--kubelet-client-keytoapiserver-kubelet-client.key--service-account-key-filetosa.pub--requestheader-client-ca-filetofront-proxy-ca.crt--proxy-client-cert-filetofront-proxy-client.crt--proxy-client-key-filetofront-proxy-client.key
Other flags for securing the front proxy (API Aggregation) communications:
--requestheader-username-headers=X-Remote-User--requestheader-group-headers=X-Remote-Group--requestheader-extra-headers-prefix=X-Remote-Extra---requestheader-allowed-names=front-proxy-client
[!TIP]
If kubeadm is invoked specifying a
--pod-network-cidr, the subnet manager feature required for some CNI network plugins is enabled by setting:
--allocate-node-cidrs=true
--cluster-cidrand--node-cidr-mask-sizeflags according to the given CIDRIf a cloud provider is specified, the corresponding
--cloud-provideris specified, together with the--cloud-configpath if such configuration file exists (this is experimental, alpha and will be removed in a future version)
other flags
--controllersenabling all the default controllers plusBootstrapSignerandTokenCleanercontrollers for TLS bootstrap. See TLS Bootstrapping for more details--use-service-account-credentialsto trueFlags for using certificates generated in previous steps:
--root-ca-fileto ca.crt--cluster-signing-cert-filetoca.crt, if External CA mode is disabled, otherwise to""--cluster-signing-key-filetoca.key, if External CA mode is disabled, otherwise to""--service-account-private-key-fileto sa.key
flow
pod creation
ingress traffic

contol plane
TCP
Inbound
6443
Kubernetes API server
All
TCP
Inbound
2379-2380
etcd server client API
kube-apiserver, etcd
TCP
Inbound
10250
Kubelet API
Self, Control plane
TCP
Inbound
10259
kube-scheduler
Self
TCP
Inbound
10257
kube-controller-manager
Self
worker node(s)
TCP
Inbound
10250
Kubelet API
Self, Control plane

control pannel
kube-apiserver

etcd

kube-scheduler

controller manager

ccm : cloud controller manager

work node
[!NOTE]
linux
containerd
unix:///var/run/containerd/containerd.sock
CRI-O
unix:///var/run/crio/crio.sock
Docker Engine (using cri-dockerd)
unix:///var/run/cri-dockerd.sock
windows
containerd
npipe:////./pipe/containerd-containerd
Docker Engine (using cri-dockerd)
npipe:////./pipe/cri-dockerd
kubelet

kube proxy

cri-o : container runtime

jsonpath
[!NOTE|label:references:]
options
explain
or
__start_kubectl
__start_kubectl_complete_alias
_complete_aliaskubecolor
token
check token
generate token
[!NOET|label:see also:]
[!TIP]
ubuntu
CentOS/RHEL
references
Last updated
Was this helpful?
