promenade/promenade/templates/roles/genesis/etc/kubernetes/manifests
Mark Burnett 1399731096 Use separate CA for kubelet authorization
This increases isolation of actions against the node API.  With the
previous combined CA approach, each node would have a valid key to talk
to each other node.  With this separated approach, only the API servers
will have keys with access to the node APIs.

Change-Id: I2705016eb963ca9d2cc2a344047677f4b2cc3025
2018-08-28 09:38:34 -05:00
..
auxiliary-kubernetes-etcd.yaml Update Labels - Application/Component 2018-05-30 22:56:15 +08:00
bootstrap-armada.yaml Update Labels - Application/Component 2018-05-30 22:56:15 +08:00
kubernetes-apiserver.yaml Use separate CA for kubelet authorization 2018-08-28 09:38:34 -05:00
kubernetes-controller-manager.yaml Update Labels - Application/Component 2018-05-30 22:56:15 +08:00
kubernetes-etcd.yaml Update Labels - Application/Component 2018-05-30 22:56:15 +08:00
kubernetes-scheduler.yaml Enable etcd helm test to run on non-ready nodes 2018-07-19 13:29:18 -05:00