From 8c0829565e7d66c331935c1fb436f9f9d9244f71 Mon Sep 17 00:00:00 2001 From: Stefan Kiss Date: Fri, 22 Nov 2019 08:47:10 +0200 Subject: [PATCH] Remove redundant rbac bootstrapping --- ...08-bootstrapping-kubernetes-controllers.md | 58 ------------------- 1 file changed, 58 deletions(-) diff --git a/docs/08-bootstrapping-kubernetes-controllers.md b/docs/08-bootstrapping-kubernetes-controllers.md index 1c2883b..1cb5c65 100644 --- a/docs/08-bootstrapping-kubernetes-controllers.md +++ b/docs/08-bootstrapping-kubernetes-controllers.md @@ -277,64 +277,6 @@ ok > Remember to run the above commands on each controller node: `controller-0`, `controller-1`, and `controller-2`. -## RBAC for Kubelet Authorization - -In this section you will configure RBAC permissions to allow the Kubernetes API Server to access the Kubelet API on each worker node. Access to the Kubelet API is required for retrieving metrics, logs, and executing commands in pods. - -> This tutorial sets the Kubelet `--authorization-mode` flag to `Webhook`. Webhook mode uses the [SubjectAccessReview](https://kubernetes.io/docs/admin/authorization/#checking-api-access) API to determine authorization. - -``` -gcloud compute ssh controller-0 -``` - -Create the `system:kube-apiserver-to-kubelet` [ClusterRole](https://kubernetes.io/docs/admin/authorization/rbac/#role-and-clusterrole) with permissions to access the Kubelet API and perform most common tasks associated with managing pods: - -``` -cat <