oadm-create-kubeconfig man page

oadm create-kubeconfig — Create a basic .kubeconfig file from client certs


oadm create-kubeconfig [Options]


Create's a .kubeconfig file at <--kubeconfig> that looks like this:

clusters: - cluster:
certificate-authority-data: <contents of --certificate-authority>
server: <--master>
name: <--cluster> - cluster:
certificate-authority-data: <contents of --certificate-authority>
server: <--public-master>
name: public-<--cluster> contexts: - context:
cluster: <--cluster>
user: <--user>
namespace: <--namespace>
name: <--context> - context:
cluster: public-<--cluster>
user: <--user>
namespace: <--namespace>
name: public-<--context> current-context: <--context> kind: Config users: - name: <--user>
client-certificate-data: <contents of --client-certificate>
client-key-data: <contents of --client-key>


Files containing signing authorities to use to verify the API server's serving certificate.
The client cert file.
The client key file.
Path for the resulting .kubeconfig file.
--master=" ⟨https://localhost:8443"⟩
The API server's URL.
Namespace for this context in .kubeconfig.
The API public facing server's URL (if applicable).

Options Inherited from Parent Commands

DEPRECATED: The API version to use when talking to the server

Username to impersonate for the operation.

The name of the kubeconfig cluster to use

Path to the config file to use for CLI requests.

The name of the kubeconfig context to use

The Google Cloud Platform Service Account JSON Key to use for authentication.

If true, the server's certificate will not be checked for validity. This will make your HTTPS connections insecure.

Maximum number of seconds between log flushes

Require server version to match client version

The address and port of the Kubernetes API server

Bearer token for authentication to the API server.

The name of the kubeconfig user to use

See Also



June 2016, Ported from the Kubernetes man-doc generator

Referenced By


Openshift CLI User Manuals Openshift June 2016