questions about possible vulnerability -- masscan port scanning #3111
-
hi, We are running nebari local in a cloud vm and we have ran 3 or 4 such all-in-one nebari vm's If they run for a few days our clouds flags us for "possible abuse", they see port scanning traffic on the network. At least one of our vm's we see masscan running under the root account? Anyone know anything about this? is this a known issue? |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
Hey @verhulstm, thanks for reaching out. Though this is an interesting discovery regarding the vulnerability, If you are looking for a local deployment, I suggest using k3s for setting up the cluster. We are currently working on supporting it, and we have this repository that sets Ansible to create the cluster on a set of machines. We don't have clear docs on this yet, but we are moving towards that direction soon. Here are the current options for deploying in the docs yet https://www.nebari.dev/docs/get-started/deploy |
Beta Was this translation helpful? Give feedback.
Hey @verhulstm, thanks for reaching out. Though this is an interesting discovery regarding the vulnerability,
nebari local
is not expected to run in production since it uses kind to set up the environment.If you are looking for a local deployment, I suggest using k3s for setting up the cluster. We are currently working on supporting it, and we have this repository that sets Ansible to create the cluster on a set of machines. We don't have clear docs on this yet, but we are moving towards that direction soon.
Here are the current options for deploying in the docs yet https://www.nebari.dev/docs/get-started/deploy