PATH 创建/root/.kube/config # 设置集群参数,--server指定Master节点ip kubectl config set-cluster kubernetes \ --certificate-authority token.csv /etc/kubernetes/ //设置集群参数--server为master节点ip # kubectl config set-cluster kubernetes \ --certificate-authority / 创建kube-proxy.kubeconfig # 设置集群参数 --server参数为master ip kubectl config set-cluster kubernetes \ --certificate-authority kube-proxy.kubeconfig # mv kube-proxy.kubeconfig /etc/kubernetes/ 设置集群参数和客户端认证参数时 –embed-certs 都为 true,这会将 certificate-authority
请求方法,kubectl 命令格式: kubectl get node -s "域名信息/外网访问地址" --username=用户名 --password=密码 --certificate-authority https://cls-66668888.ccs.tencent-cloud.com" --username=admin --password=6666o9oIB2gHD88882quIfLMy6666 --certificate-authority centos ~]# kubectl get node -s "cls-h5dfwr4g.ccs.tencent-cloud.com" --username=xxxx --password=xxxx --certificate-authority /cls-h5dfwr4g.ccs.tencent-cloud.com" --username=admin --password=XyUi2kzTM7yhPiynfrDnuhBdX0Uzinvi --certificate-authority username=basic_user] [--password=basic_password] kubectl config set-cluster NAME [--server=server] [--certificate-authority
KUBE_APISERVER="https://192.168.1.121:6443" # # 设置集群参数 # kubectl config set-cluster kubernetes \ --certificate-authority 设置默认上下文 # kubectl config use-context default --kubeconfig=bootstrap.kubeconfig --embed-certs 为 true 时表示将 certificate-authority KUBE_APISERVER="https://192.168.1.121:6443" # # 设置集群参数 # kubectl config set-cluster kubernetes \ --certificate-authority config use-context default --kubeconfig=kube-proxy.kubeconfig 设置集群参数和客户端认证参数时 --embed-certs 都为 true,这会将 certificate-authority
--certificate-authority="": 用以进行认证授权的.cert文件路径。 --client-certificate="": TLS使用的客户端证书路径。 export KUBE_APISERVER="https://172.20.0.2:6443" 2、设置集群参数 kubectl config set-cluster kubernetes --certificate-authority 使用set-cluster设置了需要访问的集群,如上为kubernetes;--certificate-authority设置了该集群的公钥;--embed-certs为true表示将--certificate-authority
PATH 创建/root/.kube/config # 设置集群参数,--server指定Master节点ip kubectl config set-cluster kubernetes \ --certificate-authority token.csv /etc/kubernetes/ //设置集群参数--server为master节点ip # kubectl config set-cluster kubernetes \ --certificate-authority / 创建kube-proxy.kubeconfig # 设置集群参数 --server参数为master ip kubectl config set-cluster kubernetes \ --certificate-authority kube-proxy.kubeconfig # mv kube-proxy.kubeconfig /etc/kubernetes/ 设置集群参数和客户端认证参数时 –embed-certs 都为 true,这会将 certificate-authority
4.1 设置集群参数kubectl config set-cluster ${CLUSTERID} --certificate-authority=. embed-certs=true --server=${APISRRVICE} --kubeconfig=xxx.kubeconfigCLUSTERID是集群名称,--embed-certs=true表示将certificate-authority 证书写入到生成的xxx.kubeconfig文件中,--certificate-authority指定集群的ca证书,--server指定集群的apiserver地址。 /ca.crt <<EOF${CA_CERT}EOFfor i in $@ ; do # 设置集群参数 --embed-certs为true时表示将certificate-authority证书写入到生成的 xxxx.kubeconfig文件中 kubectl config set-cluster ${CLUSTERID} --certificate-authority=.
export KUBE_APISERVER="https://172.20.0.113:6443" # 设置集群参数 kubectl config set-cluster kubernetes \ --certificate-authority 使用set-cluster设置了需要访问的集群,如上为kubernetes,这只是个名称,实际为--server指向的apiserver;--certificate-authority设置了该集群的公钥 ;--embed-certs为true表示将--certificate-authority证书写入到kubeconfig中;--server则表示该集群的kube-apiserver地址 生成的kubeconfig
client-key: /var/run/kubernetes/dd_cs_client.key clusters: - name: local cluster: certificate-authority dd_kubelet_client.crt client-key: /home/dd_kubelet_client.key clusters: - name: local cluster: certificate-authority dd_kubelet_client.crt client-key: /home/dd_kubelet_client.key clusters: - name: local cluster: certificate-authority
kubectl config set-cluster mycluster --kubeconfig=/tmp/config --certificate-authority=/etc/kubernetes pki/ca.crt --embed-certs=true --server="https://192.168.10.129:6443" 选项: --kubeconfig="":配置文件存放路径 --certificate-authority ="": 设置kuebconfig配置文件中集群选项中的certificate-authority路径。
# 生成 kubectl 配置文件 echo "Create kubectl kubeconfig..." kubectl config set-cluster kubernetes \ --certificate-authority 配置文件 echo "Create kube-controller-manager kubeconfig..." kubectl config set-cluster kubernetes \ --certificate-authority kube-scheduler 配置文件 echo "Create kube-scheduler kubeconfig..." kubectl config set-cluster kubernetes \ --certificate-authority 配置文件,需要添加对应的 nodeName echo "Create kubelet kubeconfig..." kubectl config set-cluster kubernetes \ --certificate-authority kube-proxy 配置文件 echo "Create kube-proxy kubeconfig..." kubectl config set-cluster kubernetes \ --certificate-authority
# 生成 kubectl 配置文件 echo "Create kubectl kubeconfig..." kubectl config set-cluster kubernetes \ --certificate-authority 配置文件 echo "Create kube-controller-manager kubeconfig..." kubectl config set-cluster kubernetes \ --certificate-authority kube-scheduler 配置文件 echo "Create kube-scheduler kubeconfig..." kubectl config set-cluster kubernetes \ --certificate-authority 配置文件,需要添加对应的 nodeName echo "Create kubelet kubeconfig..." kubectl config set-cluster kubernetes \ --certificate-authority kube-proxy 配置文件 echo "Create kube-proxy kubeconfig..." kubectl config set-cluster kubernetes \ --certificate-authority
3-1.在 master-01 创建设置集群参数kubectl config set-cluster kubernetes \--certificate-authority=/etc/kubernetes kubernetes/kubeconfig/scheduler.kubeconfig3-2.在 master-02 创建设置集群参数kubectl config set-cluster kubernetes \--certificate-authority kubernetes/kubeconfig/scheduler.kubeconfig3-3.在 master-03 创建设置集群参数kubectl config set-cluster kubernetes \--certificate-authority
k8s/bin/environment.sh 3 [root@k8smaster01 work]# kubectl config set-cluster kubernetes \ 4 --certificate-authority k8smaster01 work]# kubectl config use-context kubernetes --kubeconfig=kubectl.kubeconfig # 设置默认上下文 解释: --certificate-authority
如下kubelet的kubeconfig中的certificate-authority就指定了用于认证tls证书的CA。--tls-cert-file中需要有server字段的名称。 current-context: my-context apiVersion: v1 clusters: - cluster: certificate-authority: /path/to/my/ca.crt
0m --keep-tag-revisions=0 --registry-url=docker-registry-default.router.default.svc.cluster.local --certificate-authority
False) 你也可以直接修改 k8s 配置 ,像这样 ~/.kube/config apiVersion: v1 clusters: - cluster: api-version: v1 certificate-authority
3-1.在 master-01 创建设置集群参数kubectl config set-cluster kubernetes \--certificate-authority=/etc/kubernetes kubernetes/kubeconfig/controller.kubeconfig3-2.在 master-02 创建设置集群参数kubectl config set-cluster kubernetes \--certificate-authority kubernetes/kubeconfig/controller.kubeconfig3-3.在 master-03 创建设置集群参数kubectl config set-cluster kubernetes \--certificate-authority
将群集详细信息添加到配置文件中: kubectl config --kubeconfig=config-demo set-cluster development --server=https://1.2.3.4 --certificate-authority config --kubeconfig=config-demo view 输出展示了两个集群、两个用户和三个上下文: apiVersion: v1 clusters: - cluster: certificate-authority =config-demo view --minify 输出结果展示了 dev-frontend 上下文相关的配置信息: apiVersion: v1 clusters: - cluster: certificate-authority
KUBE_APISERVER="https://192.168.1.121:6443" # # 设置集群参数 # kubectl config set-cluster kubernetes \ --certificate-authority
kubectl的配置文件,包含访问 `apiserver 的所有信息,如 apiserver 地址、CA 证书和自身使用的证书kubectl config set-cluster kubernetes --certificate-authority 创建kube-controller-manager的kube-controller-manager.kubeconfigkubectl config set-cluster kubernetes --certificate-authority lskube-scheduler.csrkube-scheduler-csr.jsonkube-scheduler-key.pemkube-scheduler.pem3.3 创建kube-scheduler的kubeconfigkubectl config set-cluster kubernetes --certificate-authority