Pods should use `root-ca-file` to pass serving certificates to the API server

Set up the kubernetes integration.

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Description

Pods should be allowed to verify the API server’s serving certificate before establishing connections. Processes running in pods that need to contact the API server must verify the API server’s serving certificate. Failure to do so could result in the pod being subject to man-in-the-middle attacks.

Remediation

Edit the Controller Manager pod specification file /etc/kubernetes/manifests/kube-controller-manager.yaml on the master node and set the --root-ca-file parameter to the certificate bundle file: --root-ca-file=<path/to/file>