Skip to content
This repository has been archived by the owner on May 16, 2023. It is now read-only.

Make use of secure port when accessing Kubelet API #471

Merged
merged 6 commits into from
Apr 3, 2020
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 7 additions & 1 deletion metricbeat/examples/security/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,13 @@ metricbeatConfig:
- volume
period: 10s
host: "${NODE_NAME}"
hosts: ["${NODE_NAME}:10255"]
hosts: ["https://${NODE_NAME}:10250"]
bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token
ssl.verification_mode: "none"
# If using Red Hat OpenShift remove ssl.verification_mode entry and
# uncomment these settings:
#ssl.certificate_authorities:
#- /var/run/secrets/kubernetes.io/serviceaccount/service-ca.crt
processors:
- add_kubernetes_metadata:
in_cluster: true
Expand Down
9 changes: 8 additions & 1 deletion metricbeat/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,13 @@ metricbeatConfig:
- volume
period: 10s
host: "${NODE_NAME}"
hosts: ["${NODE_NAME}:10255"]
hosts: ["https://${NODE_NAME}:10250"]
bearer_token_file: /var/run/secrets/kubernetes.io/serviceaccount/token
ssl.verification_mode: "none"
# If using Red Hat OpenShift remove ssl.verification_mode entry and
# uncomment these settings:
#ssl.certificate_authorities:
#- /var/run/secrets/kubernetes.io/serviceaccount/service-ca.crt
processors:
- add_kubernetes_metadata:
in_cluster: true
Expand Down Expand Up @@ -145,6 +151,7 @@ clusterRoleRules:
- events
- deployments
- nodes
- nodes/stats
- replicasets
verbs:
- get
Expand Down