document the RBAC role binding process for TLS bootstrapping
parent
94cbe1e683
commit
f7532568be
|
@ -316,14 +316,14 @@ aws elb register-instances-with-load-balancer \
|
||||||
|
|
||||||
## RBAC
|
## RBAC
|
||||||
|
|
||||||
Set up bootstrapping roles:
|
The following command will grant the `kubelet-bootstrap` user the permissions necessary to request a client TLS certificate.
|
||||||
|
|
||||||
```
|
Bind the `kubelet-bootstrap` user to the `system:node-bootstrapper` cluster role:
|
||||||
gcloud compute ssh controller0
|
|
||||||
```
|
|
||||||
|
|
||||||
```
|
```
|
||||||
kubectl create clusterrolebinding kubelet-bootstrap \
|
kubectl create clusterrolebinding kubelet-bootstrap \
|
||||||
--clusterrole=system:node-bootstrapper \
|
--clusterrole=system:node-bootstrapper \
|
||||||
--user=kubelet-bootstrap
|
--user=kubelet-bootstrap
|
||||||
```
|
```
|
||||||
|
|
||||||
|
At this point kubelets can now request a TLS client certificate as defined in the [kubelet TLS bootstrapping guide](https://kubernetes.io/docs/admin/kubelet-tls-bootstrapping/).
|
||||||
|
|
Loading…
Reference in New Issue