@@ -29,7 +29,7 @@ your cluster. The API server doesn't manage these static Pods. An attacker with
29
29
access to this location could modify the configuration of static pods loaded from that
30
30
source, or could introduce new static Pods.
31
31
32
- Static Pods are restricted from accessing other objects in the Kubernetes API . For example,
32
+ Static Pods are restricted from accessing other objects in the Kubernetes API. For example,
33
33
you can't configure a static Pod to mount a Secret from the cluster. However, these Pods can
34
34
take other security sensitive actions, such as using ` hostPath ` mounts from the underlying
35
35
node.
@@ -41,7 +41,7 @@ be discovered by tooling that has access to the affected host(s).
41
41
42
42
If a static Pod fails admission control, the kubelet won't register the Pod with the
43
43
API server. However, the Pod still runs on the node. For more information, refer to
44
- [ kubeadm issue #1541 ] ( https://github.com/kubernetes/kubeadm/issues/1541#issuecomment-487331701 ) ).
44
+ [ kubeadm issue #1541 ] ( https://github.com/kubernetes/kubeadm/issues/1541#issuecomment-487331701 ) .
45
45
46
46
### Mitigations {#static-pods-mitigations}
47
47
@@ -89,7 +89,7 @@ The default anonymous access doesn't make this assertion with the control plane.
89
89
## The etcd API
90
90
91
91
Kubernetes clusters use etcd as a datastore. The ` etcd ` service listens on TCP port 2379.
92
- the only clients that need access are the Kubernetes API server and any backup tooling
92
+ The only clients that need access are the Kubernetes API server and any backup tooling
93
93
that you use. Direct access to this API allows for disclosure or modification of any
94
94
data held in the cluster.
95
95
@@ -117,7 +117,7 @@ that are only used for health checking can also grant full read and write access
117
117
authentication to that service.
118
118
- Control access to the private key for the etcd server certificate, and to the API server's
119
119
client certificate and key.
120
- - Consider restricting access to the the etcd port at a network level, to only allow access
120
+ - Consider restricting access to the etcd port at a network level, to only allow access
121
121
from specified and trusted IP address ranges.
122
122
123
123
0 commit comments