You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: containers/kubernetes/reference-content/secure-cluster-with-private-network.mdx
+6-7Lines changed: 6 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,8 +27,6 @@ By default, worker nodes are currently delivered with public IP addresses ([cont
27
27
28
28
Even though these nodes have public IP addresses for specific maintenance and operational purposes, your cluster's security remains uncompromised. See below for more information. Optionally, you can configure your nodes inside an entirely private network using [full isolation](#what-is-the-difference-between-controlled-isolation-and-full-isolation).
29
29
30
-
<Lightboxsrc="scaleway-kubernetes-kapsule-on-pn-v2.webp"alt="Schema Kubernetes Kapsule on Private Networks"size="large" />
31
-
32
30
## Why have a Private Network for your Kubernetes Kapsule cluster?
33
31
34
32
A Private Network offers crucial functionalities to your cluster, including:
@@ -44,7 +42,7 @@ Worker node pools with controlled isolation inside a Private Network have both p
| Description | Worker nodes are assigned both private IPs and public IPs.<br />All inbound traffic on the public interface is dropped by default using Security Groups. |Worker nodes are set without public IPs (100% private network).<br />A [Public Gateway](/network/public-gateways/how-to/configure-a-public-gateway/) is required. | Clusters without a Private Network attached.<br />Nodes have public-only endpoints. |
45
+
| Description | Worker nodes are assigned both private IPs and public IPs.<br />All inbound traffic on the public interface is dropped by default using Security Groups. |The control plane and worker nodes are set without public IPs (100% private network).<br />A [Public Gateway](/network/public-gateways/how-to/configure-a-public-gateway/) is required. | Clusters without a Private Network attached.<br />Nodes have public-only endpoints. |
48
46
| Benefits | 1. Strong security<br /> 2. Dynamic public IPs to reach out to external providers while avoiding rate limiting | 1. Maximum security <br />2. A stable egress IP for secure connection to external providers | n/a |
49
47
| Notice | Default choice for new clusters. Can be used in combination with pools using full isolation. | Requires a Public Gateway, which incurs additional costs. | Deprecated in October 2023. |
50
48
@@ -98,6 +96,7 @@ curl --request POST \
98
96
}'
99
97
```
100
98
99
+
101
100
<Messagetype="note">
102
101
Replace `<PRIVATE_NETWORK_ID>` with the ID of the Private Network in question.
103
102
</Message>
@@ -198,11 +197,11 @@ You can find a Terraform configuration example below:
198
197
}
199
198
```
200
199
201
-
## Will the control plane also be located inside the Private Network?
200
+
## Is the control plane also located inside the Private Network?
202
201
203
-
Currently, only worker nodes are located in the Private Network of your cluster. The communication between the nodes and the control plane uses the Public IP of the node. You can reach the control plane for nodes using [full isolation](#what-is-the-difference-between-controlled-isolation-and-full-isolation) by adding a [Public Gateway](/network/public-gateways/how-to/configure-a-public-gateway/) to the cluster.
202
+
The control plane and worker nodes are located in your cluster's Private Network. You can reach the control plane for nodes using [full isolation](#what-is-the-difference-between-controlled-isolation-and-full-isolation) by adding a [Public Gateway](/network/public-gateways/how-to/configure-a-public-gateway/) to the cluster.
204
203
205
-
## What future options will there be for isolation?
204
+
## Are there additional options for isolation?
206
205
207
-
-**Control plane in isolation** with nodes and API communicating in the same isolated network.
206
+
-You can restrict and allow a range of IPs to control who can access the API server of your fully isolated clusters. [Learn how to manage allowed IPs](/containers/kubernetes/how-to/manage-allowed-ips)
208
207
- The CNI’s network policies will restrict/allow a range of IPs or ports to control who can access the API server.
0 commit comments