Replies: 1 comment 1 reply
-
This is currently possibly, although inconvenient. RKE2 is built using k3s, so a lot of the principles from there apply here as well. For that reason, it's possible to do some "manual/limited hardening" with config flags that are described in the k3s docs here. That whole page is relevant, but I linked the args specifically to keep it simple. So effectively to me this ask would be like incorporating some of those in a "one line flag" instead of having multiple configs; is that a correct assumption? |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Related to #3612
If I'm not wrong, right now a config like
profile: CIS-XX
enable "CIS mode", provisioning several rke2 hardening configurations (network policy, psp/pss, etcd hardening, etc.). It would be useful to give more control about those configurations without the need of CIS mode. A simple use case could be "enabled etcd hardening without enabling default network policies, enforcing psp etc".Example:
profile: CIS-XX
, those options will be enabled by default:profile: CIS-XX
, those options will be enabled by default (included in CIS profile), but you can override and disable it:profile: CIS-XX
you can still use some of those features:As future improvement, it might be thought to provide the single hardening configurations as feature flag (es: --enable-etcd-hardening) instead of strictly related it to CIS mode?
Beta Was this translation helpful? Give feedback.
All reactions