- kube-apiserver Configuration (v1)
- Resource Types
AdmissionConfiguration
AuthorizationConfiguration
EncryptionConfiguration
AESConfiguration
AdmissionPluginConfiguration
AuthorizerConfiguration
IdentityConfiguration
KMSConfiguration
Key
ProviderConfiguration
ResourceConfiguration
SecretboxConfiguration
WebhookConfiguration
WebhookConnectionInfo
WebhookMatchCondition
kube-apiserver Configuration (v1)
Package v1 is the v1 version of the API.
Resource Types
AdmissionConfiguration
AdmissionConfiguration provides versioned configuration for admission controllers.
Field | Description |
---|---|
apiVersion string | apiserver.config.k8s.io/v1 |
kind string | AdmissionConfiguration |
plugins []AdmissionPluginConfiguration | Plugins allows specifying a configuration per admission control plugin. |
AuthorizationConfiguration
Field | Description |
---|---|
apiVersion string | apiserver.config.k8s.io/v1 |
kind string | AuthorizationConfiguration |
authorizers [Required][]AuthorizerConfiguration | Authorizers is an ordered list of authorizers to authorize requests against. This is similar to the —authorization-modes kube-apiserver flag Must be at least one. |
EncryptionConfiguration
EncryptionConfiguration stores the complete configuration for encryption providers. It also allows the use of wildcards to specify the resources that should be encrypted. Use ‘.’ to encrypt all resources within a group or ‘.‘ to encrypt all resources. ‘.’ can be used to encrypt all resource in the core group. ‘.‘ will encrypt all resources, even custom resources that are added after API server start. Use of wildcards that overlap within the same resource list or across multiple entries are not allowed since part of the configuration would be ineffective. Resource lists are processed in order, with earlier lists taking precedence.
Example:
kind: EncryptionConfiguration
apiVersion: apiserver.config.k8s.io/v1
resources:
- resources:
- events
providers:
- identity: {} # do not encrypt events even though *.* is specified below
- resources:
- secrets
- configmaps
- pandas.awesome.bears.example
providers:
- aescbc:
keys:
- name: key1
secret: c2VjcmV0IGlzIHNlY3VyZQ==
- resources:
- '*.apps'
providers:
- aescbc:
keys:
- name: key2
secret: c2VjcmV0IGlzIHNlY3VyZSwgb3IgaXMgaXQ/Cg==
- resources:
- '*.*'
providers:
- aescbc:
keys:
- name: key3
secret: c2VjcmV0IGlzIHNlY3VyZSwgSSB0aGluaw==
Field | Description |
---|---|
apiVersion string | apiserver.config.k8s.io/v1 |
kind string | EncryptionConfiguration |
resources [Required][]ResourceConfiguration | resources is a list containing resources, and their corresponding encryption providers. |
AESConfiguration
Appears in:
AESConfiguration contains the API configuration for an AES transformer.
Field | Description |
---|---|
keys [Required][]Key | keys is a list of keys to be used for creating the AES transformer. Each key has to be 32 bytes long for AES-CBC and 16, 24 or 32 bytes for AES-GCM. |
AdmissionPluginConfiguration
Appears in:
AdmissionPluginConfiguration provides the configuration for a single plug-in.
Field | Description |
---|---|
name [Required]string | Name is the name of the admission controller. It must match the registered admission plugin name. |
path string | Path is the path to a configuration file that contains the plugin’s configuration |
configuration k8s.io/apimachinery/pkg/runtime.Unknown | Configuration is an embedded configuration object to be used as the plugin’s configuration. If present, it will be used instead of the path to the configuration file. |
AuthorizerConfiguration
Appears in:
Field | Description |
---|---|
type [Required]string | Type refers to the type of the authorizer “Webhook” is supported in the generic API server Other API servers may support additional authorizer types like Node, RBAC, ABAC, etc. |
name [Required]string | Name used to describe the webhook This is explicitly used in monitoring machinery for metrics Note: Names must be DNS1123 labels like |
webhook [Required]WebhookConfiguration | Webhook defines the configuration for a Webhook authorizer Must be defined when Type=Webhook Must not be defined when Type!=Webhook |
IdentityConfiguration
Appears in:
IdentityConfiguration is an empty struct to allow identity transformer in provider configuration.
KMSConfiguration
Appears in:
KMSConfiguration contains the name, cache size and path to configuration file for a KMS based envelope transformer.
Field | Description |
---|---|
apiVersion string | apiVersion of KeyManagementService |
name [Required]string | name is the name of the KMS plugin to be used. |
cachesize int32 | cachesize is the maximum number of secrets which are cached in memory. The default value is 1000. Set to a negative value to disable caching. This field is only allowed for KMS v1 providers. |
endpoint [Required]string | endpoint is the gRPC server listening address, for example “unix:///var/run/kms-provider.sock”. |
timeout meta/v1.Duration | timeout for gRPC calls to kms-plugin (ex. 5s). The default is 3 seconds. |
Key
Appears in:
Key contains name and secret of the provided key for a transformer.
Field | Description |
---|---|
name [Required]string | name is the name of the key to be used while storing data to disk. |
secret [Required]string | secret is the actual key, encoded in base64. |
ProviderConfiguration
Appears in:
ProviderConfiguration stores the provided configuration for an encryption provider.
Field | Description |
---|---|
aesgcm [Required]AESConfiguration | aesgcm is the configuration for the AES-GCM transformer. |
aescbc [Required]AESConfiguration | aescbc is the configuration for the AES-CBC transformer. |
secretbox [Required]SecretboxConfiguration | secretbox is the configuration for the Secretbox based transformer. |
identity [Required]IdentityConfiguration | identity is the (empty) configuration for the identity transformer. |
kms [Required]KMSConfiguration | kms contains the name, cache size and path to configuration file for a KMS based envelope transformer. |
ResourceConfiguration
Appears in:
ResourceConfiguration stores per resource configuration.
Field | Description |
---|---|
resources [Required][]string | resources is a list of kubernetes resources which have to be encrypted. The resource names are derived from |
providers [Required][]ProviderConfiguration | providers is a list of transformers to be used for reading and writing the resources to disk. eg: aesgcm, aescbc, secretbox, identity, kms. |
SecretboxConfiguration
Appears in:
SecretboxConfiguration contains the API configuration for an Secretbox transformer.
Field | Description |
---|---|
keys [Required][]Key | keys is a list of keys to be used for creating the Secretbox transformer. Each key has to be 32 bytes long. |
WebhookConfiguration
Appears in:
Field | Description |
---|---|
authorizedTTL [Required]meta/v1.Duration | The duration to cache ‘authorized’ responses from the webhook authorizer. Same as setting |
unauthorizedTTL [Required]meta/v1.Duration | The duration to cache ‘unauthorized’ responses from the webhook authorizer. Same as setting |
timeout [Required]meta/v1.Duration | Timeout for the webhook request Maximum allowed value is 30s. Required, no default value. |
subjectAccessReviewVersion [Required]string | The API version of the authorization.k8s.io SubjectAccessReview to send to and expect from the webhook. Same as setting |
matchConditionSubjectAccessReviewVersion [Required]string | MatchConditionSubjectAccessReviewVersion specifies the SubjectAccessReview version the CEL expressions are evaluated against Valid values: v1 Required, no default value |
failurePolicy [Required]string | Controls the authorization decision when a webhook request fails to complete or returns a malformed response or errors evaluating matchConditions. Valid values:
|
connectionInfo [Required]WebhookConnectionInfo | ConnectionInfo defines how we talk to the webhook |
matchConditions [Required][]WebhookMatchCondition | matchConditions is a list of conditions that must be met for a request to be sent to this webhook. An empty list of matchConditions matches all requests. There are a maximum of 64 match conditions allowed. The exact matching logic is (in order):
|
WebhookConnectionInfo
Appears in:
Field | Description |
---|---|
type [Required]string | Controls how the webhook should communicate with the server. Valid values:
|
kubeConfigFile [Required]string | Path to KubeConfigFile for connection info Required, if connectionInfo.Type is KubeConfig |
WebhookMatchCondition
Appears in:
Field | Description |
---|---|
expression [Required]string | expression represents the expression which will be evaluated by CEL. Must evaluate to bool. CEL expressions have access to the contents of the SubjectAccessReview in v1 version. If version specified by subjectAccessReviewVersion in the request variable is v1beta1, the contents would be converted to the v1 version before evaluating the CEL expression.
Documentation on CEL: https://kubernetes.io/docs/reference/using-api/cel/ |