Hi,
-
I’m trying to figure out how iptables configurations are maintained between reboots and updates. If I add commands to iptablesConfig in the installer, will they persist on node reboot?
-
Do you have an example set of iptables commands that work with the defaults set by kube and flannel that would restrict ingress and egress to the cluster?
Example, I see that I can connect to the etcd service from another node in my subnet. Is the expectation that I would use security groups or equivalent in my infrastructure? If so, what do I do if I don’t have an equivalent to security groups but want to limit access to etcd to the nodes of my cluster only?
Here are the services and ports I can access from my subnet:
kube-apis *:6443
etcd *:2380
etcd *:2379
kubelet *:10250
kube-prox *:10256
node_expo *:9100
I know these are required for cluster communication. I simply want to be able to specify which nodes are part of the cluster and which ports are expected for ingress to my application. The iptables rules that get applied is pretty comprehensive but it’s not obvious where to safely add rules.
TIA