k8s操作手册 2.3
apiServer: �meoutForControlPlane: 4m0s apiVersion: kubeadm.k8s.io/v1beta2 cer�ficatesDir: /etc/kubernetes/pki clusterName: kubernetes controllerManager: {} dns: type: CoreDNS etcd: local: dataDir: /var/lib/etcd ★如果不想配置信任私有镜像仓库,也可将服务器证书添加到操作系统的ca证 书库里 # cat ca.com.crt >> /etc/pki/tls/certs/ca-bundle.crt #将ca证书添加到centos系统证书信任列表中,链接到: /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem ②安装k8s二进制组件 #使用aliy apiServer: �meoutForControlPlane: 4m0s apiVersion: kubeadm.k8s.io/v1beta3 cer�ficatesDir: /etc/kubernetes/pki clusterName: kubernetes controllerManager: {} dns: {} etcd: local: dataDir: /var/lib/etcd imageRepository:0 码力 | 126 页 | 4.33 MB | 1 年前3OpenShift Container Platform 4.4 构建(build)
您的订阅必须可以访问红帽权利,而且权利必须具有单独的公钥和私钥文件。 流程 流程 1. 创建包含权利的 secret,确保存在含有权利公钥和私钥的单独文件: $ oc create secret generic etc-pki-entitlement --from-file /path/to/entitlement/{ID}.pem \ > --from-file /path/to/entitlement/{ID}-key RHEL 的镜像创建镜像流。这样可在整个集群中使用该镜像流。 source: secrets: - secret: name: etc-pki-entitlement destinationDir: etc-pki-entitlement OpenShift Container Platform 4.4 构 构建( 建(build) ) 76 10.3. 使用 SUBSCRIPTION Manager 安装内容: FROM registry.redhat.io/rhel7:latest USER root # Copy entitlements COPY ./etc-pki-entitlement /etc/pki/entitlement # Copy subscription manager configurations COPY ./rhsm-conf /etc/rhsm COPY0 码力 | 101 页 | 1.12 MB | 1 年前3OpenShift Container Platform 4.13 CI/CD
Linux(RHEL)7 执行 Entitlement Build 时,在运行任何 yum 命令前,必须在 Dockerfile 中包含以下指令: 流程 流程 1. 在构建配置的 Docker 策略中将 etc-pki-entitlement secret 添加为构建卷: 2.10.3. 使用 Subscription Manager 运行构建 2.10.3.1. 使用 使用 Subscription Manager volumes: - name: etc-pki-entitlement mounts: - destinationPath: /etc/pki/entitlement source: type: Secret secret: secretName: etc-pki-entitlement FROM registry /7/7Server/x86_64/os enabled=1 gpgcheck=0 sslverify=0 sslclientkey = /etc/pki/entitlement/...-key.pem sslclientcert = /etc/pki/entitlement/....pem $ oc create configmap yum-repos-d --from-file /path/to/satellite0 码力 | 129 页 | 1.37 MB | 1 年前3CIS 1.6 Benchmark - Self-Assessment Guide - Rancher v2.5.4
etcd:etcd (Automated) 1.1.19 Ensure that the Kubernetes PKI directory and file ownership is set to root:root (Automated) 1.1.20 Ensure that the Kubernetes PKI certificate file permissions are set to 644 or more more restrictive (Automated) 1.1.21 Ensure that the Kubernetes PKI key file permissions are set to 600 (Automated) 1.1.1 Ensure that the API server pod specification file permissions are set to 644 or more Expected Result: 'etcd:etcd' is present Returned Value: etcd:etcd 1.1.19 Ensure that the Kubernetes PKI directory and file ownership is set to root:root (Automated) Result: pass Remediation: Run the below0 码力 | 132 页 | 1.12 MB | 1 年前3Rancher CIS Kubernetes v.1.4.0 Benchmark Self Assessment
ller-manager.yaml Returned Value: root:root Result: Pass 1.4.19 - Ensure that the Kubernetes PKI directory and file ownership is set to root:root (Scored) Audit ls -laR /etc/kubernetes/ssl/ |grep 1285 Jul 1 19:53 kube-service-account-token.pem Result: Pass 1.4.20 - Ensure that the Kubernetes PKI certificate file permissions are set to 644 or more restrictive (Scored) Audit stat -c "%n - %a" /etc/kubernetes/ssl/kube-service-account-token.pem - 644 Result: Pass 1.4.21 - Ensure that the Kubernetes PKI key file permissions are set to 600 (Scored) Audit stat -c "%n - %a" /etc/kubernetes/ssl/*key* Returned0 码力 | 47 页 | 302.56 KB | 1 年前3Istio audit report - ADA Logics - 2023-01-30 - v1.0
io/istio/security/pkg/ pki/ca https://github.com/istio/istio/blob/6 5478ea81272c0ceaab568974aff7 00aef907312/security/pkg/pki/ca/f uzz_test.go#L24 5 FuzzValidateCSR istio.io/istio/security/pkg/ pki/ra https://github https://github.com/istio/istio/blob/6 5478ea81272c0ceaab568974aff7 00aef907312/security/pkg/pki/ra/fu zz_test.go#L23 9 Istio Security Audit, 2023 6 FuzzBuildSecurityCaller istio.io/istio/security/pkg/ server/ca0 码力 | 55 页 | 703.94 KB | 1 年前3OpenShift Container Platform 4.13 认证和授权
PROFILE=SYSTEM SSLProxyCipherSuite PROFILE=SYSTEM SSLCertificateFile /etc/pki/tls/certs/localhost.crt SSLCertificateKeyFile /etc/pki/tls/private/localhost.key # Configure HTTPD to execute scripts ScriptAlias of: # openssl x509 -text -in /etc/pki/tls/certs/localhost.crt ServerName www.example.com DocumentRoot /var/www/html SSLEngine on SSLCertificateFile /etc/pki/tls/certs/localhost.crt apiVersion: 51 SSLCertificateKeyFile /etc/pki/tls/private/localhost.key SSLCACertificateFile /etc/pki/CA/certs/ca.crt SSLProxyEngine on SSLProxyCACertificateFile /etc/pki/CA/certs/ca.crt # It is critical0 码力 | 201 页 | 2.74 MB | 1 年前3CIS Benchmark Rancher Self-Assessment Guide - v2.4
configuration is passed in as arguments at container run time. 1.1.19 Ensure that the Kubernetes PKI directory and file ownership is set to root:root (Scored) Result: PASS Remediation: Run the below %U:%G /etc/kubernetes/ssl Expected result: 'root:root' is present 1.1.20 Ensure that the Kubernetes PKI certificate file permissions are set to 644 or more restrictive (Scored) Result: PASS Remediation: '/etc/kubernetes/ssl/*.pem' Expected result: 'true' is present 1.1.21 Ensure that the Kubernetes PKI key file permissions are set to 600 (Scored) Result: PASS Remediation: Run the below command (based0 码力 | 54 页 | 447.77 KB | 1 年前3CIS 1.5 Benchmark - Self-Assessment Guide - Rancher v2.5
configuration is passed in as arguments at container run time. 1.1.19 Ensure that the Kubernetes PKI directory and file ownership is set to root:root (Scored) Result: PASS Remediation: Run the below %U:%G /etc/kubernetes/ssl Expected result: 'root:root' is present 1.1.20 Ensure that the Kubernetes PKI certificate file permissions are set to 644 or more restrictive (Scored) Result: PASS Remediation: '/etc/kubernetes/ssl/*.pem' Expected result: 'true' is present 1.1.21 Ensure that the Kubernetes PKI key file permissions are set to 600 (Scored) Result: PASS Remediation: Run the below command (based0 码力 | 54 页 | 447.97 KB | 1 年前3OpenShift Container Platform 4.6 网络
章 配置集群范 配置集群范围 围代理 代理 17.1. 先决条件 17.2. 启用集群范围代理 17.3. 删除集群范围代理服务器 其他资源 第 第 18 章 章 配置自定 配置自定义 义 PKI 18.1. 在安装过程中配置集群范围代理 18.2. 启用集群范围代理 18.3. 使用 OPERATOR 进行证书注入 第 第 19 章 章 RHOSP 负载 负载均衡 均衡 19.1. (CR),将 Ingress Controller 配置为使用自定义证书。 先决条件 先决条件 您必须在 PEM 编码文件中有一个证书/密钥对,其中该证书由可信证书认证机构签名,或者由您 在一个自定义 PKI 中配置的私有可信证书认证机构签名。 您的证书满足以下要求: 该证书对入口域有效。 证书使用 subjectAltName 扩展来指定通配符域,如 *.apps.ocp4.example.com。 替换为要注解的 Ingress Controller 的名称。 在整个集群中启用 HTTP/2。 要为整个集群启用 HTTP/2,请输入 oc annotate 命令: 6.9. 其他资源 配置自定义 PKI $ oc -n openshift-ingress-operator annotate ingresscontrollers/ingress.operator 0 码力 | 256 页 | 2.78 MB | 1 年前3
共 32 条
- 1
- 2
- 3
- 4