Skip to content

Commit da7e8d2

Browse files
added steps to fix metadata access and compatibility (#550)
* added steps to fix meta-data-access and compatablity * Update source/plugins/cloudstack-kubernetes-service.rst Co-authored-by: Suresh Kumar Anaparti <sureshkumar.anaparti@gmail.com>
1 parent 19bc138 commit da7e8d2

File tree

1 file changed

+54
-0
lines changed

1 file changed

+54
-0
lines changed

source/plugins/cloudstack-kubernetes-service.rst

Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -385,6 +385,53 @@ The service provides functionality to access kubeconfig file for a running Kuber
385385

386386
getKubernetesClusterConfig API can be used to retrieve kubeconfig file data for a cluster. It takes id of the cluster as the input parameter.
387387

388+
Note: The User Data and Metadata of the underlying host can be accessed by the container running on the CKS cluster. If you want prevent the access follow the below steps
389+
390+
.. parsed-literal::
391+
392+
- The User Data and Metadata of the underlying worker-nodes can be accessed by the containers running on the CKS cluster
393+
394+
For example: Deploy a container on a CKS cluster
395+
396+
kubectl exec -it <container> -- /bin/sh
397+
398+
curl http://data-server/latest/meta-data/
399+
service-offering
400+
availability-zone
401+
local-ipv4
402+
local-hostname
403+
public-ipv4
404+
public-hostname
405+
instance-id
406+
vm-id
407+
public-keys
408+
cloud-identifier
409+
hypervisor-host-name
410+
411+
curl http://data-server/latest/user-data/
412+
413+
414+
- If you want to prevent the access of User Data and Metadata from the containers running on CKS cluster, Execute the following yaml
415+
416+
kubectl apply -f deny-meta-data.yaml
417+
418+
apiVersion: networking.k8s.io/v1
419+
kind: NetworkPolicy
420+
metadata:
421+
name: deny-metadata-access
422+
spec:
423+
podSelector: {}
424+
policyTypes:
425+
- Egress
426+
egress:
427+
- to:
428+
- ipBlock:
429+
cidr: 169.254.188.68/32
430+
ports:
431+
- protocol: TCP
432+
port: 80
433+
434+
388435
Kubernetes cluster web dashboard
389436
#################################
390437

@@ -429,6 +476,13 @@ Kubernetes compatibility Matrix
429476
+--------------+---------------------------------+-----------------------------+-------------+
430477
| 4.16.1 | v1.20 onward | SystemVM Template (Debian) | cloud |
431478
+--------------+---------------------------------+-----------------------------+-------------+
479+
| 4.19.1 | v1.30 onward | SystemVM Template (Debian) | cloud |
480+
+--------------+---------------------------------+-----------------------------+-------------+
481+
| 4.20.1 | v1.30 onward | SystemVM Template (Debian) | cloud |
482+
+--------------+---------------------------------+-----------------------------+-------------+
483+
| 4.21.0 | v1.33 onward | SystemVM Template (Debian) | cloud |
484+
+--------------+---------------------------------+-----------------------------+-------------+
485+
432486

433487
Adding/Removing Instances for an ExternalManaged Kubernetes Cluster
434488
###################################################################

0 commit comments

Comments
 (0)