unnecessary port exposure after installing #4270
Unanswered
ChrisHolman
asked this question in
Q&A
Replies: 2 comments 1 reply
-
As discussed on Slack:
|
Beta Was this translation helpful? Give feedback.
0 replies
-
We're running RKE2 as a single node cluster, API server and kublet are in the same VM - so in this scenario, we don't need these services exposed globally. For example, within K8s,(https://kubernetes.io/docs/reference/command-line-tools-reference/kubelet/#options) we can specify (within config file) Does RKE2 allow us to override the configuration for each individual service, or are we stuck with it being exposed? |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
After installing RKE2 (rke2 version v1.25.9+rke2r1 (842d05e) there are unnecessary open ports exposed outside of the node, specifically these:
983002/kube-apiserv on 0.0.0.0:6443
1000/systemd-resolv on 0.0.0.0:5355
982742/kubelet on 0.0.0.0:10250
985099/calico-node on 0.0.0.0:9091
After disabling IPV6, they are still listening on 0.0.0.0. Can't seem to find a configuration option to lock down these services to the internal network only.
Any ideas?
Beta Was this translation helpful? Give feedback.
All reactions