Closed JPFrancoia closed 1 year ago
Hey @JPFrancoia, Thanks for reaching out. The rules you see apply to the Calico vxlan only. The pods and services communicate through this virtual network and the traffic is tunneled through the actual network link. The virtual network is local and shared across the nodes of a Kubernetes cluster. These rules are set up here in MicroK8s. The usual configuration is to allow any host in/out since pods/services can use a wide variety of IP addresses. You can also take a look at the Calico requirements.
Hey, thanks for coming back to me! Ok so from what I understand, it only affects this virtual network. Can I safely assume that it doesn't expose the host (aka my computer) on a new port to the whole internet?
Yes, I'd say it's safe to assume that.
Awesome, thanks!
Hi, I deployed a microk8s cluster and it's working like a charm. I followed the tuto here: https://ubuntu.com/tutorials/install-a-local-kubernetes-with-microk8s#2-deploying-microk8s. I just have a simple question about the ufw rules. After installation, here is what I have (I removed everything that wasn't relevant):
I'm a bit afraid of the inbound rules, (ALLOW IN from Anywhere). To be honest, I don't understand them (I wasn't able to find out which ports they open) and it would be awesome if you could give an explanation about what they do.
If possible I'd like to only expose the https port to the whole internet, and I'm wondering if I can limit the calico rules to local networks?