Securing Kubernetes infrastructure
In Chapter 2, Architecting Production-Grade Kubernetes Infrastructure, we discussed the best practices for the network infrastructure for Kubernetes clusters and we proposed design guidelines that are essential for the infrastructure security of clusters. While these guidelines are essential for you to consider and follow, you still need to evaluate the entire network security requirements of your infrastructure to be sure that you have a complete and appropriate security solution for your environment and product.
Most of these security recommendations and best practices are implemented within the Terraform and Ansible configurations that we did in the previous chapters:
- Use multiple availability zones (three or more) to deploy your Kubernetes cluster for high availability.
- Deploy the control plane and worker nodes in private subnets only. Use the public subnets for internet-facing load balancers.
- Do not allow public access to worker...