Skip to content

Commit d82f928

Browse files
Bob Killenk8s-ci-robot
Bob Killen
authored andcommitted
update authorization-node links (#9462)
1 parent 179701e commit d82f928

File tree

4 files changed

+4
-4
lines changed

4 files changed

+4
-4
lines changed

content/en/blog/_posts/2017-06-00-Kubernetes-1.7-Security-Hardening-Stateful-Application-Extensibility-Updates.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Also, for power users, API aggregation in this release allows user-provided apis
1616
Security:
1717

1818
- [The Network Policy API](https://kubernetes.io/docs/concepts/services-networking/network-policies/) is promoted to stable. Network policy, implemented through a network plug-in, allows users to set and enforce rules governing which pods can communicate with each other. 
19-
- [Node authorizer](https://kubernetes.io/docs/admin/authorization/node/) and admission control plugin are new additions that restrict kubelet’s access to secrets, pods and other objects based on its node.
19+
- [Node authorizer](https://kubernetes.io/docs/reference/access-authn-authz/node/) and admission control plugin are new additions that restrict kubelet’s access to secrets, pods and other objects based on its node.
2020
- [Encryption for Secrets](https://kubernetes.io/docs/tasks/administer-cluster/encrypt-data/), and other resources in etcd, is now available as alpha. 
2121
- [Kubelet TLS bootstrapping](https://kubernetes.io/docs/admin/kubelet-tls-bootstrapping/) now supports client and server certificate rotation.
2222
- [Audit logs](https://kubernetes.io/docs/tasks/debug-application-cluster/audit/) stored by the API server are now more customizable and extensible with support for event filtering and webhooks. They also provide richer data for system audit.

content/en/docs/reference/access-authn-authz/rbac.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -556,7 +556,7 @@ The permissions required by individual control loops are contained in the <a hre
556556
<td><b>system:node</b></td>
557557
<td>None in 1.8+</td>
558558
<td>Allows access to resources required by the kubelet component, <b>including read access to all secrets, and write access to all pod status objects</b>.
559-
As of 1.7, use of the <a href="/docs/admin/authorization/node/">Node authorizer</a> and <a href="/docs/admin/admission-controllers/#noderestriction">NodeRestriction admission plugin</a> is recommended instead of this role, and allow granting API access to kubelets based on the pods scheduled to run on them.
559+
As of 1.7, use of the <a href="/docs/reference/access-authn-authz/node/">Node authorizer</a> and <a href="/docs/admin/admission-controllers/#noderestriction">NodeRestriction admission plugin</a> is recommended instead of this role, and allow granting API access to kubelets based on the pods scheduled to run on them.
560560
Prior to 1.7, this role was automatically bound to the `system:nodes` group.
561561
In 1.7, this role was automatically bound to the `system:nodes` group if the `Node` authorization mode is not enabled.
562562
In 1.8+, no binding is automatically created.

content/en/docs/reference/setup-tools/kubeadm/implementation-details.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,7 @@ Kubeadm kubeconfig files with identities for control plane components:
166166

167167
- A kubeconfig file for kubelet to use, `/etc/kubernetes/kubelet.conf`; inside this file is embedded a client certificate with kubelet identity.
168168
This client cert should:
169-
- Be in the `system:nodes` organization, as required by the [Node Authorization](/docs/admin/authorization/node/) module
169+
- Be in the `system:nodes` organization, as required by the [Node Authorization](/docs/reference/access-authn-authz/node/) module
170170
- Have the CN `system:node:<hostname-lowercased>`
171171
- A kubeconfig file for controller-manager, `/etc/kubernetes/controller-manager.conf`; inside this file is embedded a client
172172
certificate with controller-manager identity. This client cert should have the CN `system:kube-controller-manager`, as defined

content/en/docs/tasks/administer-cluster/securing-a-cluster.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ an integrated [Role-Based Access Control (RBAC)](/docs/admin/authorization/rbac/
5555
set of permissions bundled into roles. These permissions combine verbs (get, create, delete) with
5656
resources (pods, services, nodes) and can be namespace or cluster scoped. A set of out of the box
5757
roles are provided that offer reasonable default separation of responsibility depending on what
58-
actions a client might want to perform. It is recommended that you use the [Node](/docs/admin/authorization/node/) and [RBAC](/docs/admin/authorization/rbac/) authorizers together, in combination with the
58+
actions a client might want to perform. It is recommended that you use the [Node](/docs/reference/access-authn-authz/node/) and [RBAC](/docs/admin/authorization/rbac/) authorizers together, in combination with the
5959
[NodeRestriction](/docs/admin/admission-controllers/#noderestriction) admission plugin.
6060

6161
As with authentication, simple and broad roles may be appropriate for smaller clusters, but as

0 commit comments

Comments
 (0)