mirror of
https://github.com/NixOS/nixpkgs.git
synced 2025-06-10 10:02:36 +09:00
nixos/manual/kubernetes: re-enabling of insecure ports is no longer possible
This commit is contained in:
parent
6ec7298ead
commit
38ea9bc083
2 changed files with 0 additions and 19 deletions
|
@ -43,14 +43,6 @@ Note: Assigning either role will also default both
|
||||||
and [](#opt-services.kubernetes.easyCerts)
|
and [](#opt-services.kubernetes.easyCerts)
|
||||||
to true. This sets up flannel as CNI and activates automatic PKI bootstrapping.
|
to true. This sets up flannel as CNI and activates automatic PKI bootstrapping.
|
||||||
|
|
||||||
As of kubernetes 1.10.X it has been deprecated to open non-tls-enabled
|
|
||||||
ports on kubernetes components. Thus, from NixOS 19.03 all plain HTTP
|
|
||||||
ports have been disabled by default. While opening insecure ports is
|
|
||||||
still possible, it is recommended not to bind these to other interfaces
|
|
||||||
than loopback. To re-enable the insecure port on the apiserver, see options:
|
|
||||||
[](#opt-services.kubernetes.apiserver.insecurePort) and
|
|
||||||
[](#opt-services.kubernetes.apiserver.insecureBindAddress)
|
|
||||||
|
|
||||||
::: {.note}
|
::: {.note}
|
||||||
As of NixOS 19.03, it is mandatory to configure:
|
As of NixOS 19.03, it is mandatory to configure:
|
||||||
[](#opt-services.kubernetes.masterAddress).
|
[](#opt-services.kubernetes.masterAddress).
|
||||||
|
|
|
@ -47,17 +47,6 @@ services.kubernetes.roles = [ "master" "node" ];
|
||||||
<xref linkend="opt-services.kubernetes.easyCerts" /> to true. This
|
<xref linkend="opt-services.kubernetes.easyCerts" /> to true. This
|
||||||
sets up flannel as CNI and activates automatic PKI bootstrapping.
|
sets up flannel as CNI and activates automatic PKI bootstrapping.
|
||||||
</para>
|
</para>
|
||||||
<para>
|
|
||||||
As of kubernetes 1.10.X it has been deprecated to open
|
|
||||||
non-tls-enabled ports on kubernetes components. Thus, from NixOS
|
|
||||||
19.03 all plain HTTP ports have been disabled by default. While
|
|
||||||
opening insecure ports is still possible, it is recommended not to
|
|
||||||
bind these to other interfaces than loopback. To re-enable the
|
|
||||||
insecure port on the apiserver, see options:
|
|
||||||
<xref linkend="opt-services.kubernetes.apiserver.insecurePort" />
|
|
||||||
and
|
|
||||||
<xref linkend="opt-services.kubernetes.apiserver.insecureBindAddress" />
|
|
||||||
</para>
|
|
||||||
<note>
|
<note>
|
||||||
<para>
|
<para>
|
||||||
As of NixOS 19.03, it is mandatory to configure:
|
As of NixOS 19.03, it is mandatory to configure:
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue