Skip to content

Commit 43ba07a

Browse files
committed
Remove duplicate info about tokens and certificates
Signed-off-by: manuelbuil <[email protected]>
1 parent 91b89db commit 43ba07a

File tree

1 file changed

+0
-20
lines changed

1 file changed

+0
-20
lines changed

docs/advanced.md

-20
Original file line numberDiff line numberDiff line change
@@ -4,26 +4,6 @@ title: "Advanced Options / Configuration"
44

55
This section contains advanced information describing the different ways you can run and manage K3s, as well as steps necessary to prepare the host OS for K3s use.
66

7-
## Certificate Management
8-
9-
### Certificate Authority Certificates
10-
11-
K3s generates self-signed Certificate Authority (CA) Certificates during startup of the first server node. These CA certificates are valid for 10 years, and are not automatically renewed.
12-
13-
For information on using custom CA certificates, or renewing the self-signed CA certificates, see the [`k3s certificate rotate-ca` command documentation](./cli/certificate.md#certificate-authority-ca-certificates).
14-
15-
### Client and Server certificates
16-
17-
K3s client and server certificates are valid for 365 days from their date of issuance. Any certificates that are expired, or within 90 days of expiring, are automatically renewed every time K3s starts.
18-
19-
For information on manually rotating client and server certificates, see the [`k3s certificate rotate` command documentation](./cli/certificate.md#client-and-server-certificates).
20-
21-
## Token Management
22-
23-
By default, K3s uses a single static token for both servers and agents. This token cannot be changed once the cluster has been created.
24-
It is possible to enable a second static token that can only be used to join agents, or to create temporary `kubeadm` style join tokens that expire automatically.
25-
For more information, see the [`k3s token` command documentation](./cli/token.md).
26-
277
## Configuring an HTTP proxy
288

299
If you are running K3s in an environment, which only has external connectivity through an HTTP proxy, you can configure your proxy settings on the K3s systemd service. These proxy settings will then be used in K3s and passed down to the embedded containerd and kubelet.

0 commit comments

Comments
 (0)