You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<pre>oc get -nopenshift-etcd cm etcd-pod -oyaml | grep "\-\-peer-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-peer/etcd-peer-NODE_NAME.crt"</pre>
To ensure the <tt>etcd</tt> service is serving TLS to peers,
9
+
make sure the <tt>etcd-pod*</tt> <tt>ConfigMaps</tt> in the
10
+
<tt>openshift-etcd</tt> namespace contain the following argument
11
+
for the <tt>etcd</tt> binary in the <tt>etcd</tt> pod:
12
+
<pre>oc get -nopenshift-etcd cm etcd-pod -oyaml | grep "\-\-peer-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-peer/etcd-peer-NODE_NAME.key"</pre>
13
13
14
14
rationale: |-
15
15
Without cryptographic integrity protections, information can be
@@ -23,9 +23,23 @@ severity: medium
23
23
references:
24
24
cis: '2.4'
25
25
26
-
ocil_clause: 'the etcd client key file is not configured'
26
+
ocil_clause: 'the etcd peer client key file is not configured'
<pre>oc get -nopenshift-etcd cm etcd-pod -oyaml | grep "\-\-peer-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-peer/etcd-peer-NODE_NAME.key"</pre>
0 commit comments