-
Notifications
You must be signed in to change notification settings - Fork 407
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Question] How authenticate the edge devices during cluster join? #1061
Comments
CC: @Windrow @FengGaoCSC |
@fujitatomoya kube-apiserver only expose https service to the public network, this means only clients have valid certificates can access kube-apiserver. so fake users can not get detail info from cluster. we also suggest that put a LoadBalancer before kube-apiserver, and configure whitelist or blacklist(like such kind of security rules) on the loadbalancer in order to get rid of security risks. |
@rambohe-ch thanks for your comment, sorry to be late to get back to you i was caught on vacation. we might have more questions in this security aspect, we would like keep this open for a bit. but if nothing comes up for weeks, please go ahead to close this issue. |
@fujitatomoya Thanks for your reply. In addition, would you like to register as an end user of OpenYurt in this issue: #300, and OpenYurt community will get more confidence from users. |
@rambohe-ch will do. |
I think this is application responsibility to secure zero trust connectivity to cluster system. at least, i understand this is out of scope for OpenYurt, so will go ahead to close this. @rambohe-ch thanks for iterating. |
@fujitatomoya sorry, i'd like to add an idea that how to improve the security of OpenYurt.
in one word, Yurthub can connect kube-apiserver through tunnels that constructed by raven, and kube-apiserver don't need to be exposed on Public network after node boostrap phase. |
@fujitatomoya I will release OpenYurt v1.2 soon, then we can take a try for above idea. |
okay, that makes sense. thanks for sharing the information. |
What happened:
According to the OpenYurt architecture, Kubernetes api-server needs to be reachable from edge devices via public network such as internet.
In that case, Kubernetes api-server must be exposed to the public network, this comes to security concern since anyone can access the Kubernetes api-server.
What you expected to happen:
Is there any best practice or solution how to deal with this possible security exposure?
We would like to know that general recommendation or suggestions how we would want to deal wit this.
/kind question
The text was updated successfully, but these errors were encountered: