-
Notifications
You must be signed in to change notification settings - Fork 166
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
IP allowlist setup for user clusters #10407
Comments
Technical details on implementation feasibility for individual expose strategies: LoadBalancer Expose StrategyAs each cluster's apiserver is exposed via a dedicated LoadBalancer k8s service ( NodePort / Tunneling Expose StrategySince for these expose strategies we reuse the same LoadBalancer k8s service ( Examples of cloud-providers that do NOT perform SNAT and would be compatible with this approach are: AWS, Azure, GCP. Examples of cloud-providers that always perform SNAT and would NOT be compatible with this approach are: OpenStack, Hetzner. A potential workaround for the SNAT on the load-balancer level would be to use the PROXY protocol between the load-balancer and nodeport-proxy. Unfortunately, that approach would break the apiserver access from within the seed cluster itself, due to the fact that Envoy cannot serve proxy and non-proxy requests at the same time & issue described in kubernetes/kubernetes#66607. Until the KEP 1860-kube-proxy-IP-node-binding is implemented, using PROXY is not feasible. Summary
|
|
As discussed within and following up on it might be a good choice here to adapt the wording, in so that the conversation revolves around an allow-list instead. |
Implemented |
Description of the feature you would like to add / User story
As a user cluster administrator
I would like to add IP allowlist for accessing their cluster API
in order to secure reaching the cluster from the internet
Solution details
Alternative approaches
Use cases
Additional information
The text was updated successfully, but these errors were encountered: