A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://cloud.google.com/kubernetes-engine/docs/concepts/network-isolation below:

About network isolation in GKE | GKE networking

This page explains how network isolation and access controls work for your Google Kubernetes Engine (GKE) cluster control plane and cluster nodes. This page replaces the page describing the concept of private clusters.

There are two aspects to consider when deciding how to configure network isolation:

This page shows you how to control and customize who can access the cluster's control plane and cluster nodes (in a Standard cluster) or workloads (in an Autopilot cluster). This customization is relevant when you are deciding the network configuration for your cluster. To go straight to defining your network configuration, see Customize your network isolation.

Best practice:

Plan and design your network isolation configuration with your organization's Network architects, Network engineers, Network administrators, or another team who is responsible for the definition, implementation, and maintenance of the network architecture.

Control plane access

In this section, you'll consider who can access your control plane.

Every GKE cluster has a control plane that handles Kubernetes API requests. The control plane runs on a virtual machine (VM) that is in a VPC network in a Google-managed project. A regional cluster has multiple replicas of the control plane, each of which runs on its own VM.

The control plane has two kinds of endpoints for cluster access:

Best practice:

Use only the DNS-based endpoint to access your control plane for simplified configuration and a flexible and policy-based layer of security.

DNS-based endpoint

The DNS-based endpoint gives a unique DNS or fully qualified domain name (FQDN) for each cluster control plane. This DNS name can be used to access your control plane. The DNS name resolves to an endpoint that is accessible from any network reachable by Google Cloud APIs, including on-premises or other cloud networks. Enabling the DNS-based endpoint eliminates the need for a bastion host or proxy nodes to access the control plane from other VPC networks or external locations.

To access the control plane endpoint, you need to configure IAM roles and policies, and authentication tokens. For more details on the exact permissions required, see Customize your network isolation.

In addition to IAM policies and tokens, you can also configure the following access attributes:

IP-based endpoints

Optionally, you can also configure access to the control plane using IP-based endpoints.

Terminology related to clusters and IP addresses

When using IP-based endpoints, you have two options:

In both of the preceding options, you can restrict which IP addresses reach the endpoints by configuring authorized networks. If you use IP-based endpoints, then we strongly recommend that you add at least one authorized network. Authorized networks grant control plane access to a specific set of trusted IPv4 addresses, and provide protection and additional security benefits for your GKE cluster.

Best practice:

Enable authorized networks when using IP-based endpoints to secure your GKE cluster.

Authorized networks provide an IP-based firewall that controls access to the GKE control plane. Access to the control plane depends on the source IP addresses. When you enable authorized networks, you configure the IP addresses for which you want to allow access to the GKE cluster control plane endpoint as a CIDR block list.

The following table shows:

Control plane endpoints Preset IP addresses that can always access the endpoints Configurable IP address that can access the endpoints after enabling authorized networks External and internal endpoints enabled Only internal endpoint enabled Note: If you only want internal IP addresses to access the control plane, ensure that you enable authorized networks after disabling the control plane's external endpoint. If you enable authorized networks with allowlisted external IP addresses before disabling the control plane external endpoint, the allowlisted addresses can still access the control plane internal endpoint.

With an authorized network, you can also configure the region from which an internal IP address can reach your control plane's internal endpoint. You can choose to allow access only from the cluster's VPC network, or from any Google Cloud region in a VPC or on-premises environment.

Limitations of using IP-based endpoints Cluster networking access

This section discusses isolating nodes within a Kubernetes cluster.

Enable private nodes

Prevent external clients from accessing nodes by provisioning those nodes only with internal IP addresses, making the nodes private. Workloads running on nodes without an external IP address cannot reach the internet unless NAT is enabled on the cluster's network. You can change these settings at any time.

You can enable private nodes at an individual cluster level or at the node pool (for Standard) or workload (for Autopilot) level. Enabling private nodes at the node pool or workload level overrides any node configuration at the cluster level.

If you update a public node pool to private mode, workloads that require access outside the cluster network might fail in the following scenarios:

Whether or not you enable private nodes, the control plane still communicates with all nodes through internal IP addresses only.

Benefits of network isolation

The following are the benefits of network isolation:

What's next

RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4