diff --git a/docs/09-bootstrapping-kubernetes-workers.md b/docs/09-bootstrapping-kubernetes-workers.md index 2aff5aa..551620e 100644 --- a/docs/09-bootstrapping-kubernetes-workers.md +++ b/docs/09-bootstrapping-kubernetes-workers.md @@ -11,7 +11,7 @@ We will now install the kubernetes components The Certificates and Configuration are created on `master-1` node and then copied over to workers using `scp`. Once this is done, the commands are to be run on first worker instance: `worker-1`. Login to first worker instance using SSH Terminal. -### Provisioning Kubelet Client Certificates +### Provisioning Kubelet Client Certificates Kubernetes uses a [special-purpose authorization mode](https://kubernetes.io/docs/admin/authorization/node/) called Node Authorizer, that specifically authorizes API requests made by [Kubelets](https://kubernetes.io/docs/concepts/overview/components/#kubelet). In order to be authorized by the Node Authorizer, Kubelets must use a credential that identifies them as being in the `system:nodes` group, with a username of `system:node:`. In this section you will create a certificate for each Kubernetes worker node that meets the Node Authorizer requirements. @@ -20,7 +20,7 @@ Generate a certificate and private key for one worker node: On master-1: ``` -master-1$ cat > openssl-worker-1.cnf < openssl-worker-1.cnf <