@@ -257,7 +257,7 @@ There are two main options for security:
257257- Access the apiserver using HTTP.
258258 - Use a firewall for security.
259259 - This is easier to setup.
260- - Access the apiserver using HTTPS
260+ - Access the apiserver using HTTPS
261261 - Use https with certs, and credentials for user.
262262 - This is the recommended approach.
263263 - Configuring certs can be tricky.
@@ -390,7 +390,7 @@ so that kube-proxy can manage iptables instead of docker.
390390 - if you have setup PodIPs to be routable, then you want this false, otherwise, docker will
391391 rewrite the PodIP source-address to a NodeIP.
392392 - some environments (e.g. GCE) still need you to masquerade out-bound traffic when it leaves the cloud environment. This is very environment specific.
393- - if you are using an overlay network, consult those instructions.
393+ - if you are using an overlay network, consult those instructions.
394394 - ` --mtu=`
395395 - may be required when using Flannel, because of the extra packet size due to udp encapsulation
396396 - ` --insecure-registry $CLUSTER_SUBNET`
@@ -430,13 +430,13 @@ Arguments to consider:
430430 - ` --kubeconfig=/var/lib/kubelet/kubeconfig`
431431 - Otherwise, if taking the firewall-based security approach
432432 - ` --api-servers=http://$MASTER_IP`
433- - ` --config=/etc/kubernetes/manifests` -%}
433+ - ` --config=/etc/kubernetes/manifests`
434434 - ` --cluster-dns=` to the address of the DNS server you will setup (see [Starting Addons](#starting-addons).)
435435 - ` --cluster-domain=` to the dns domain prefix to use for cluster DNS addresses.
436436 - ` --docker-root=`
437437 - ` --root-dir=`
438438 - ` --configure-cbr0=` (described above)
439- - ` --register-node` (described in [Node](../admin/node.md) documentation.
439+ - ` --register-node` (described in [Node](../admin/node.md) documentation.)
440440
441441# ## kube-proxy
442442
@@ -523,7 +523,7 @@ all configured and managed *by Kubernetes*:
523523
524524# ## etcd
525525
526- You will need to run one or more instances of etcd.
526+ You will need to run one or more instances of etcd.
527527 - Recommended approach : run one etcd instance, with its log written to a directory backed
528528 by durable storage (RAID, GCE PD)
529529 - Alternative : run 3 or 5 etcd instances.
@@ -547,13 +547,13 @@ To run the apiserver:
547547Here are some apiserver flags you may need to set :
548548 - ` --cloud-provider=`
549549 - ` --cloud-config=` if cloud provider requires a config file (GCE, AWS). If so, need to put config file into apiserver image or mount through hostPath.
550- - ` --address=${MASTER_IP}` .
550+ - ` --address=${MASTER_IP}` .
551551 - or `--bind-address=127.0.0.1` and `--address=127.0.0.1` if you want to run a proxy on the master node.
552552 - ` --cluster-name=$CLUSTER_NAME`
553553 - ` --service-cluster-ip-range=$SERVICE_CLUSTER_IP_RANGE`
554554 - ` --etcd-servers=http://127.0.0.1:4001`
555- - ` --tls-cert-file=/srv/kubernetes/server.cert` -%}
556- - ` --tls-private-key-file=/srv/kubernetes/server.key` -%}
555+ - ` --tls-cert-file=/srv/kubernetes/server.cert`
556+ - ` --tls-private-key-file=/srv/kubernetes/server.key`
557557 - ` --admission-control=$RECOMMENDED_LIST`
558558 - See [admission controllers](../admin/admission-controllers.md) for recommended arguments.
559559 - ` --allow-privileged=true` , only if you trust your cluster user to run pods as root.
@@ -740,7 +740,7 @@ Flags to consider using with controller manager.
740740 - ` --allocate-node-cidrs=`
741741 - *TODO*: explain when you want controller to do this and when you wanna do it another way.
742742 - ` --cloud-provider=` and `--cloud-config` as described in apiserver section.
743- - ` --service-account-private-key-file=/srv/kubernetes/server.key` , used by [service account](../user-guide/service-accounts.md) feature.
743+ - ` --service-account-private-key-file=/srv/kubernetes/server.key` , used by [service account](../user-guide/service-accounts.md) feature.
744744 - ` --master=127.0.0.1:8080`
745745
746746Template for controller manager pod :
0 commit comments