--
You received this message because you are subscribed to a topic in the Google Groups "Kubernetes developer/contributor discussion" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/kubernetes-dev/6xcGao4-5Bs/unsubscribe.
To unsubscribe from this group and all its topics, send an email to kubernetes-dev+unsubscribe@googlegroups.com.
To post to this group, send email to kubernetes-dev@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/kubernetes-dev/12150a76-85cf-40ae-a8e8-a6ce9bb7cd4a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
Got it. That's what i thought. I was hoping we could pass it in without host modifications.
Hi Andrew,Perform this on k8s nodes.
My example below is with SUSE.1. Put all your chained CA certificates in /etc/pki/trust/anchors2. Run 'update-ca-certificates'3. Check the imported certificates by 'ls /etc/ssl/certs/'4. Restart docker servicesystemctl restart docker5. TestJerry
On Mon, Nov 6, 2017 at 6:51 AM, Andrew Ray <drew...@gmail.com> wrote:
Jerry how did you import that cert? was it a config setting or just putting in in /etc/pki/... on the host machines. i am running k8s in docker and having trouble getting it installed on the master machines.
On Thursday, August 31, 2017 at 12:54:45 PM UTC-5, Jerry Hwang wrote:I found the solution. I actually also needed to import the CA cert to minions..
--
You received this message because you are subscribed to a topic in the Google Groups "Kubernetes developer/contributor discussion" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/kubernetes-dev/6xcGao4-5Bs/unsubscribe.
To unsubscribe from this group and all its topics, send an email to kubernetes-de...@googlegroups.com.
To post to this group, send email to kuberne...@googlegroups.com.