Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Insecure port is exposed on all interfaces #215

Closed
jeroenjacobs79 opened this issue Sep 6, 2017 · 2 comments
Closed

Insecure port is exposed on all interfaces #215

jeroenjacobs79 opened this issue Sep 6, 2017 · 2 comments

Comments

@jeroenjacobs79
Copy link

Hi,

In the control pane section, you expose the apiserver the insecure port on all interfaces:

--insecure-bind-address=0.0.0.0

Since the insecure port is only used by the kube-controller-manager and kube-scheduler, which use the loopback adapter to connect to the api-server, it would be a lot safer to use:

--insecure-bind-address=127.0.0.1

This little change will result in a cluster which is a lot more secure, without any side-effects.

@bgeesaman
Copy link

#208

You saw the same thing I did. It's in this PR waiting to be tested/merged.

@kelseyhightower
Copy link
Owner

Fixed! This is the configuration on master (tagged 1.8) and will remain the setting going forward. We also enabled --authorization-mode=Webhook on the kubelet.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants