Skip to content

Commit 928adc0

Browse files
authored
docs(k8s): updating docs on control plane isolation with private networks (#4117)
1 parent 0568880 commit 928adc0

File tree

1 file changed

+6
-7
lines changed

1 file changed

+6
-7
lines changed

containers/kubernetes/reference-content/secure-cluster-with-private-network.mdx

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,6 @@ By default, worker nodes are currently delivered with public IP addresses ([cont
2727

2828
Even though these nodes have public IP addresses for specific maintenance and operational purposes, your cluster's security remains uncompromised. See below for more information. Optionally, you can configure your nodes inside an entirely private network using [full isolation](#what-is-the-difference-between-controlled-isolation-and-full-isolation).
2929

30-
<Lightbox src="scaleway-kubernetes-kapsule-on-pn-v2.webp" alt="Schema Kubernetes Kapsule on Private Networks" size="large" />
31-
3230
## Why have a Private Network for your Kubernetes Kapsule cluster?
3331

3432
A Private Network offers crucial functionalities to your cluster, including:
@@ -44,7 +42,7 @@ Worker node pools with controlled isolation inside a Private Network have both p
4442

4543
| Isolation | Controlled isolation<br />(default) | Full isolation<br />(optional) | None<br />(deprecated) |
4644
|-------------|-------------------------------------------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------|----------------------------------------------|
47-
| Description | Worker nodes are assigned both private IPs and public IPs.<br />All inbound traffic on the public interface is dropped by default using Security Groups. | Worker nodes are set without public IPs (100% private network).<br />A [Public Gateway](/network/public-gateways/how-to/configure-a-public-gateway/) is required. | Clusters without a Private Network attached.<br />Nodes have public-only endpoints. |
45+
| Description | Worker nodes are assigned both private IPs and public IPs.<br />All inbound traffic on the public interface is dropped by default using Security Groups. | The control plane and worker nodes are set without public IPs (100% private network).<br />A [Public Gateway](/network/public-gateways/how-to/configure-a-public-gateway/) is required. | Clusters without a Private Network attached.<br />Nodes have public-only endpoints. |
4846
| Benefits | 1. Strong security<br /> 2. Dynamic public IPs to reach out to external providers while avoiding rate limiting | 1. Maximum security <br />2. A stable egress IP for secure connection to external providers | n/a |
4947
| Notice | Default choice for new clusters. Can be used in combination with pools using full isolation. | Requires a Public Gateway, which incurs additional costs. | Deprecated in October 2023. |
5048

@@ -98,6 +96,7 @@ curl --request POST \
9896
}'
9997
```
10098

99+
101100
<Message type="note">
102101
Replace `<PRIVATE_NETWORK_ID>` with the ID of the Private Network in question.
103102
</Message>
@@ -198,11 +197,11 @@ You can find a Terraform configuration example below:
198197
}
199198
```
200199

201-
## Will the control plane also be located inside the Private Network?
200+
## Is the control plane also located inside the Private Network?
202201

203-
Currently, only worker nodes are located in the Private Network of your cluster. The communication between the nodes and the control plane uses the Public IP of the node. You can reach the control plane for nodes using [full isolation](#what-is-the-difference-between-controlled-isolation-and-full-isolation) by adding a [Public Gateway](/network/public-gateways/how-to/configure-a-public-gateway/) to the cluster.
202+
The control plane and worker nodes are located in your cluster's Private Network. You can reach the control plane for nodes using [full isolation](#what-is-the-difference-between-controlled-isolation-and-full-isolation) by adding a [Public Gateway](/network/public-gateways/how-to/configure-a-public-gateway/) to the cluster.
204203

205-
## What future options will there be for isolation?
204+
## Are there additional options for isolation?
206205

207-
- **Control plane in isolation** with nodes and API communicating in the same isolated network.
206+
- You can restrict and allow a range of IPs to control who can access the API server of your fully isolated clusters. [Learn how to manage allowed IPs](/containers/kubernetes/how-to/manage-allowed-ips)
208207
- The CNI’s network policies will restrict/allow a range of IPs or ports to control who can access the API server.

0 commit comments

Comments
 (0)