Skip to content

Commit

Permalink
Remove extra period and the
Browse files Browse the repository at this point in the history
Signed-off-by: Derek Nola <[email protected]>
  • Loading branch information
dereknola committed Aug 5, 2024
1 parent 7640baa commit 8cf44ca
Show file tree
Hide file tree
Showing 11 changed files with 17 additions and 17 deletions.
4 changes: 2 additions & 2 deletions package/cfg/k3s-cis-1.24-hardened/master.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -347,7 +347,7 @@ groups:
Follow the documentation and configure alternate mechanisms for authentication.
If this check fails, edit the K3s config file /etc/rancher/k3s/config.yaml and remove anything similar to below.
kube-apiserver-arg:
- "token-auth-file=<path>".
- "token-auth-file=<path>"
scored: true

- id: 1.2.3
Expand Down Expand Up @@ -399,7 +399,7 @@ groups:
By default, K3s automatically provides the kubelet client certificate and key.
They are generated and located at /var/lib/rancher/k3s/server/tls/client-kube-apiserver.crt and /var/lib/rancher/k3s/server/tls/client-kube-apiserver.key
If for some reason you need to provide your own certificate and key, you can set the
the below parameters in the K3s config file /etc/rancher/k3s/config.yaml.
below parameters in the K3s config file /etc/rancher/k3s/config.yaml.
kube-apiserver-arg:
- "kubelet-client-certificate=<path/to/client-cert-file>"
- "kubelet-client-key=<path/to/client-key-file>"
Expand Down
2 changes: 1 addition & 1 deletion package/cfg/k3s-cis-1.24-hardened/node.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -352,7 +352,7 @@ groups:
By default, K3s automatically provides the TLS certificate and private key for the Kubelet.
They are generated and located at /var/lib/rancher/k3s/agent/serving-kubelet.crt and /var/lib/rancher/k3s/agent/serving-kubelet.key
If for some reason you need to provide your own certificate and key, you can set the
the below parameters in the K3s config file /etc/rancher/k3s/config.yaml.
below parameters in the K3s config file /etc/rancher/k3s/config.yaml.
kubelet-arg:
- "tls-cert-file=<path/to/tls-cert-file>"
- "tls-private-key-file=<path/to/tls-private-key-file>"
Expand Down
4 changes: 2 additions & 2 deletions package/cfg/k3s-cis-1.24-permissive/master.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -347,7 +347,7 @@ groups:
Follow the documentation and configure alternate mechanisms for authentication.
If this check fails, edit the K3s config file /etc/rancher/k3s/config.yaml and remove anything similar to below.
kube-apiserver-arg:
- "token-auth-file=<path>".
- "token-auth-file=<path>"
scored: true

- id: 1.2.3
Expand Down Expand Up @@ -400,7 +400,7 @@ groups:
By default, K3s automatically provides the kubelet client certificate and key.
They are generated and located at /var/lib/rancher/k3s/server/tls/client-kube-apiserver.crt and /var/lib/rancher/k3s/server/tls/client-kube-apiserver.key
If for some reason you need to provide your own certificate and key, you can set the
the below parameters in the K3s config file /etc/rancher/k3s/config.yaml.
below parameters in the K3s config file /etc/rancher/k3s/config.yaml.
kube-apiserver-arg:
- "kubelet-client-certificate=<path/to/client-cert-file>"
- "kubelet-client-key=<path/to/client-key-file>"
Expand Down
2 changes: 1 addition & 1 deletion package/cfg/k3s-cis-1.24-permissive/node.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -357,7 +357,7 @@ groups:
By default, K3s automatically provides the TLS certificate and private key for the Kubelet.
They are generated and located at /var/lib/rancher/k3s/agent/serving-kubelet.crt and /var/lib/rancher/k3s/agent/serving-kubelet.key
If for some reason you need to provide your own certificate and key, you can set the
the below parameters in the K3s config file /etc/rancher/k3s/config.yaml.
below parameters in the K3s config file /etc/rancher/k3s/config.yaml.
kubelet-arg:
- "tls-cert-file=<path/to/tls-cert-file>"
- "tls-private-key-file=<path/to/tls-private-key-file>"
Expand Down
4 changes: 2 additions & 2 deletions package/cfg/k3s-cis-1.7-hardened/master.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -348,7 +348,7 @@ groups:
Follow the documentation and configure alternate mechanisms for authentication.
If this check fails, edit the K3s config file /etc/rancher/k3s/config.yaml and remove anything similar to below.
kube-apiserver-arg:
- "token-auth-file=<path>".
- "token-auth-file=<path>"
scored: true

- id: 1.2.3
Expand Down Expand Up @@ -383,7 +383,7 @@ groups:
By default, K3s automatically provides the kubelet client certificate and key.
They are generated and located at /var/lib/rancher/k3s/server/tls/client-kube-apiserver.crt and /var/lib/rancher/k3s/server/tls/client-kube-apiserver.key
If for some reason you need to provide your own certificate and key, you can set the
the below parameters in the K3s config file /etc/rancher/k3s/config.yaml.
below parameters in the K3s config file /etc/rancher/k3s/config.yaml.
kube-apiserver-arg:
- "kubelet-client-certificate=<path/to/client-cert-file>"
- "kubelet-client-key=<path/to/client-key-file>"
Expand Down
4 changes: 2 additions & 2 deletions package/cfg/k3s-cis-1.7-permissive/master.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -349,7 +349,7 @@ groups:
Follow the documentation and configure alternate mechanisms for authentication.
If this check fails, edit the K3s config file /etc/rancher/k3s/config.yaml and remove anything similar to below.
kube-apiserver-arg:
- "token-auth-file=<path>".
- "token-auth-file=<path>"
scored: true

- id: 1.2.3
Expand Down Expand Up @@ -384,7 +384,7 @@ groups:
By default, K3s automatically provides the kubelet client certificate and key.
They are generated and located at /var/lib/rancher/k3s/server/tls/client-kube-apiserver.crt and /var/lib/rancher/k3s/server/tls/client-kube-apiserver.key
If for some reason you need to provide your own certificate and key, you can set the
the below parameters in the K3s config file /etc/rancher/k3s/config.yaml.
below parameters in the K3s config file /etc/rancher/k3s/config.yaml.
kube-apiserver-arg:
- "kubelet-client-certificate=<path/to/client-cert-file>"
- "kubelet-client-key=<path/to/client-key-file>"
Expand Down
2 changes: 1 addition & 1 deletion package/cfg/k3s-cis-1.7-permissive/node.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -337,7 +337,7 @@ groups:
By default, K3s automatically provides the TLS certificate and private key for the Kubelet.
They are generated and located at /var/lib/rancher/k3s/agent/serving-kubelet.crt and /var/lib/rancher/k3s/agent/serving-kubelet.key
If for some reason you need to provide your own certificate and key, you can set the
the below parameters in the K3s config file /etc/rancher/k3s/config.yaml.
below parameters in the K3s config file /etc/rancher/k3s/config.yaml.
kubelet-arg:
- "tls-cert-file=<path/to/tls-cert-file>"
- "tls-private-key-file=<path/to/tls-private-key-file>"
Expand Down
4 changes: 2 additions & 2 deletions package/cfg/k3s-cis-1.8-hardened/master.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -348,7 +348,7 @@ groups:
Follow the documentation and configure alternate mechanisms for authentication.
If this check fails, edit the K3s config file /etc/rancher/k3s/config.yaml and remove anything similar to below.
kube-apiserver-arg:
- "token-auth-file=<path>".
- "token-auth-file=<path>"
scored: true

- id: 1.2.3
Expand Down Expand Up @@ -383,7 +383,7 @@ groups:
By default, K3s automatically provides the kubelet client certificate and key.
They are generated and located at /var/lib/rancher/k3s/server/tls/client-kube-apiserver.crt and /var/lib/rancher/k3s/server/tls/client-kube-apiserver.key
If for some reason you need to provide your own certificate and key, you can set the
the below parameters in the K3s config file /etc/rancher/k3s/config.yaml.
below parameters in the K3s config file /etc/rancher/k3s/config.yaml.
kube-apiserver-arg:
- "kubelet-client-certificate=<path/to/client-cert-file>"
- "kubelet-client-key=<path/to/client-key-file>"
Expand Down
2 changes: 1 addition & 1 deletion package/cfg/k3s-cis-1.8-hardened/node.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -330,7 +330,7 @@ groups:
By default, K3s automatically provides the TLS certificate and private key for the Kubelet.
They are generated and located at /var/lib/rancher/k3s/agent/serving-kubelet.crt and /var/lib/rancher/k3s/agent/serving-kubelet.key
If for some reason you need to provide your own certificate and key, you can set the
the below parameters in the K3s config file /etc/rancher/k3s/config.yaml.
below parameters in the K3s config file /etc/rancher/k3s/config.yaml.
kubelet-arg:
- "tls-cert-file=<path/to/tls-cert-file>"
- "tls-private-key-file=<path/to/tls-private-key-file>"
Expand Down
4 changes: 2 additions & 2 deletions package/cfg/k3s-cis-1.8-permissive/master.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -349,7 +349,7 @@ groups:
Follow the documentation and configure alternate mechanisms for authentication.
If this check fails, edit the K3s config file /etc/rancher/k3s/config.yaml and remove anything similar to below.
kube-apiserver-arg:
- "token-auth-file=<path>".
- "token-auth-file=<path>"
scored: true

- id: 1.2.3
Expand Down Expand Up @@ -384,7 +384,7 @@ groups:
By default, K3s automatically provides the kubelet client certificate and key.
They are generated and located at /var/lib/rancher/k3s/server/tls/client-kube-apiserver.crt and /var/lib/rancher/k3s/server/tls/client-kube-apiserver.key
If for some reason you need to provide your own certificate and key, you can set the
the below parameters in the K3s config file /etc/rancher/k3s/config.yaml.
below parameters in the K3s config file /etc/rancher/k3s/config.yaml.
kube-apiserver-arg:
- "kubelet-client-certificate=<path/to/client-cert-file>"
- "kubelet-client-key=<path/to/client-key-file>"
Expand Down
2 changes: 1 addition & 1 deletion package/cfg/k3s-cis-1.8-permissive/node.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -335,7 +335,7 @@ groups:
By default, K3s automatically provides the TLS certificate and private key for the Kubelet.
They are generated and located at /var/lib/rancher/k3s/agent/serving-kubelet.crt and /var/lib/rancher/k3s/agent/serving-kubelet.key
If for some reason you need to provide your own certificate and key, you can set the
the below parameters in the K3s config file /etc/rancher/k3s/config.yaml.
below parameters in the K3s config file /etc/rancher/k3s/config.yaml.
kubelet-arg:
- "tls-cert-file=<path/to/tls-cert-file>"
- "tls-private-key-file=<path/to/tls-private-key-file>"
Expand Down

0 comments on commit 8cf44ca

Please sign in to comment.