-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CAPA Kubernetes API allow lists #2351
Comments
Are we going to create a new operator for that? |
Regarding the creation of a new operator, I don't think that's going to work. CAPA is reconciling the security groups and the ingress rules. I tested changing the ingress rules on one of the security groups and it got reverted by CAPA. So creating a new controller wouldn't help because it would be fighting CAPA all the time, re updating the ingress rule forever. I submitted a PR upstream that would provide us with this functionality. The problem with that is that it will probably take a while until it's merged. Maybe we could use our fork if we really need this and we can't wait. |
I think we should be integrating in our fork any patch / PR we submit upstream because we would be testing the change before we get feedback from them. |
Yeah, agree. I'll do that. Regarding solving this issue, I think we can still wait and we can consider deploying our fork to all MCs later on if upstream doesn't move fast enough? |
This has been merged but still not released. |
Waiting on this PR now kubernetes-sigs/cluster-api-provider-aws#4406 |
This PR exposes a new value in our |
To make it easier for customers to template new clusters without asking us the MC Nat Gateway IPs, we talked about adding a new defaulting to The problem is that the field containing the Nat Gateway IPs was added in the latest CAPA release v2.2.4, which means we need to bump version of dependencies on |
I asked in Slack whether CAPA maintainers would consider upgrading |
Story
-As a cluster admin, I want to have the Kubernetes API protected by allow lists in order to improve the security of clusters.
Background
The Kubernetes API is not protected for public CAPA clusters. This, of course, is really bad for security and needs to be changed.
Requirements
Questions
Links
The text was updated successfully, but these errors were encountered: