Skip to content

Commit 96d03b0

Browse files
committed
Clarify front-proxy certificate dependency on aggregation layer
The note in the kubelet certificates section described the front-proxy CA as something you only need `if you run kube-proxy to support an extension API server`. kube-proxy is the node-level Service networking component and is not involved in extension API server delivery; the actual mechanism is the apiserver aggregation layer. Reword the note to point at the aggregation layer with a link to the matching task page, while keeping the existing extension API server reference. Closes #55622.
1 parent ada14be commit 96d03b0

1 file changed

Lines changed: 3 additions & 2 deletions

File tree

content/en/docs/setup/best-practices/certificates.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,8 +57,9 @@ In this scenario, there are two approaches for certificate usage:
5757
`kubelet-client.key` are created.
5858

5959
{{< note >}}
60-
`front-proxy` certificates are required only if you run kube-proxy to support
61-
[an extension API server](/docs/tasks/extend-kubernetes/setup-extension-api-server/).
60+
`front-proxy` certificates are required only when using the
61+
[aggregation layer](/docs/tasks/extend-kubernetes/configure-aggregation-layer/)
62+
to enable an [extension (aggregated) API server](/docs/tasks/extend-kubernetes/setup-extension-api-server/).
6263
{{< /note >}}
6364

6465
etcd also implements mutual TLS to authenticate clients and peers.

0 commit comments

Comments
 (0)