···43and [](#opt-services.kubernetes.easyCerts)
44to true. This sets up flannel as CNI and activates automatic PKI bootstrapping.
4546-As of kubernetes 1.10.X it has been deprecated to open non-tls-enabled
47-ports on kubernetes components. Thus, from NixOS 19.03 all plain HTTP
48-ports have been disabled by default. While opening insecure ports is
49-still possible, it is recommended not to bind these to other interfaces
50-than loopback. To re-enable the insecure port on the apiserver, see options:
51-[](#opt-services.kubernetes.apiserver.insecurePort) and
52-[](#opt-services.kubernetes.apiserver.insecureBindAddress)
53-54::: {.note}
55As of NixOS 19.03, it is mandatory to configure:
56[](#opt-services.kubernetes.masterAddress).
···43and [](#opt-services.kubernetes.easyCerts)
44to true. This sets up flannel as CNI and activates automatic PKI bootstrapping.
450000000046::: {.note}
47As of NixOS 19.03, it is mandatory to configure:
48[](#opt-services.kubernetes.masterAddress).
···47 <xref linkend="opt-services.kubernetes.easyCerts" /> to true. This
48 sets up flannel as CNI and activates automatic PKI bootstrapping.
49 </para>
50- <para>
51- As of kubernetes 1.10.X it has been deprecated to open
52- non-tls-enabled ports on kubernetes components. Thus, from NixOS
53- 19.03 all plain HTTP ports have been disabled by default. While
54- opening insecure ports is still possible, it is recommended not to
55- bind these to other interfaces than loopback. To re-enable the
56- insecure port on the apiserver, see options:
57- <xref linkend="opt-services.kubernetes.apiserver.insecurePort" />
58- and
59- <xref linkend="opt-services.kubernetes.apiserver.insecureBindAddress" />
60- </para>
61 <note>
62 <para>
63 As of NixOS 19.03, it is mandatory to configure:
···47 <xref linkend="opt-services.kubernetes.easyCerts" /> to true. This
48 sets up flannel as CNI and activates automatic PKI bootstrapping.
49 </para>
0000000000050 <note>
51 <para>
52 As of NixOS 19.03, it is mandatory to configure: