etcd client certificate file not defined
이 페이지는 아직 한국어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Id: 3f5ff8a7-5ad6-4d02-86f5-666307da1b20
Cloud Provider: Kubernetes
Platform: Kubernetes
Severity: Medium
Category: Secret Management
Learn More
Description
When the kube-apiserver process is present in a Pod’s containers or initContainers, the --etcd-cafile flag should be set. The rule detects kube-apiserver in container command arrays and reports resources where the --etcd-cafile flag is not defined. Setting --etcd-cafile ensures the API server verifies etcd’s CA certificate.
Compliant Code Examples
apiVersion: v1
kind: Pod
metadata:
name: command-demo
labels:
purpose: demonstrate-command
spec:
containers:
- name: command-demo-container
image: gcr.io/google_containers/kube-apiserver-amd64:v1.6.0
command: ["kube-apiserver"]
args: ["--etcd-cafile=/path/to/ca/file.pem"]
restartPolicy: OnFailure
apiVersion: v1
kind: Pod
metadata:
name: command-demo
labels:
purpose: demonstrate-command
spec:
containers:
- name: command-demo-container
image: gcr.io/google_containers/kube-apiserver-amd64:v1.6.0
command: ["kube-apiserver","--etcd-cafile=/path/to/ca/file.pem"]
args: []
restartPolicy: OnFailure
Non-Compliant Code Examples
apiVersion: v1
kind: Pod
metadata:
name: command-demo
labels:
purpose: demonstrate-command
spec:
containers:
- name: command-demo-container
image: gcr.io/google_containers/kube-apiserver-amd64:v1.6.0
command: ["kube-apiserver"]
args: []
restartPolicy: OnFailure