Hardening Guide - Rancher v2.3.3+"etcd", "worker" ] addon_job_timeout: 30 authentication: strategy: x509 authorization: {} bastion_host: ssh_agent_auth: false cloud_provider: {} ignore_docker_version: true # # # Currently only nginx rancher_kubernetes_engine_config: addon_job_timeout: 30 authentication: strategy: x509 authorization: {} bastion_host: ssh_agent_auth: false cloud_provider: {} ignore_docker_version: true # # # Currently only0 码力 | 44 页 | 279.78 KB | 1 年前3
Rancher Hardening Guide v2.3.5extra_volumes: [] extra_volume_mounts: [] cluster_name: "" prefix_path: "" addon_job_timeout: 0 bastion_host: address: "" port: "" user: "" ssh_key: "" ssh_key_path: "" ssh_cert: "" Hardening0 码力 | 21 页 | 191.56 KB | 1 年前3
Rancher Hardening Guide v2.4extra_volumes: [] extra_volume_mounts: [] cluster_name: "" prefix_path: "" addon_job_timeout: 0 bastion_host: address: "" port: "" user: "" ssh_key: "" ssh_key_path: "" ssh_cert: ""0 码力 | 22 页 | 197.27 KB | 1 年前3
Deploying and ScalingKubernetes with Rancher
architecture where you must dynamically manage service endpoints. While Docker allows networking at the host level only (and Docker Swarm works across hosts), Kubernetes makes network management much easier easier, by enabling any pod to talk to other pods within same namespace, irrespective of the host. This makes exposing ports and managing links between different services much easier. 1.3.7 Load Balancing newly-created Kubernetes environment from the drop-down menu at top of the screen, where we can add a host machine from some of public clouds or from a custom stack. In this example, we’ll choose the custom0 码力 | 66 页 | 6.10 MB | 1 年前3
SUSE Rancher and RKE Kubernetes cluster
using CSI Driver on DELL EMC PowerFlex node components is one CPU and 1 GB of memory. Considering the CPU and memory, it is recommended to host the different roles of the Kubernetes cluster such as etcd , control plane, and workers on different ssh/id_rsa]: [+] Number of Hosts [1]: [+] SSH Address of host (1) [none]: 192.168.153.111 [+] SSH Port of host (1) [22]: [+] SSH Private Key Path of host (192.168.153.111) [none]: [-] You have entered empty Key of host (192.168.153.111) [none]: [-] You have entered empty SSH key, defaulting to cluster level SSH key: ~/.ssh/id_rsa [+] SSH User of host (192.168.153.111) [ubuntu]: tux [+] Is host (192.1680 码力 | 45 页 | 3.07 MB | 1 年前3
Rancher CIS Kubernetes v.1.4.0 Benchmark Self
Assessmentcontainer. It's combined with the RKE cluster.yml extra- binds: option to map the audit log to the host filesystem. Audit logs should be collected and shipped off-system to guarantee their integrity. details in the following files: /etc/kubernetes/admission.yaml /etc/kubernetes/event.yaml See Host Configuration for details. Audit (Admissions plugin) docker inspect kube-apiserver | jq -e '.[0] AdvancedAuditing=false should not be set, but --audit-policy-file should be set and configured. See Host Configuration for a sample audit policy file. Audit (Feature Gate) docker inspect kube-apiserver0 码力 | 47 页 | 302.56 KB | 1 年前3
Rancher Hardening Guide Rancher v2.1.xperformance of the technology Authors Jason Greathouse Bill Maxwell 1.1 - Rancher HA Kubernetes cluster host configuration 1.1.1 - Configure default sysctl settings on all hosts Profile Applicability Level rules: - level: Metadata 1.1.4 - Place Kubernetes event limit configuration on each control plane host Rancher_Hardening_Guide.md 11/30/2018 6 / 24 Profile Applicability Level 1 Description Place share the host process ID namespace (Not Scored) 1.7.3 - Do not admit containers wishing to share the host IPC namespace (Not Scored) 1.7.4 - Do not admit containers wishing to share the host network namespace0 码力 | 24 页 | 336.27 KB | 1 年前3
Rancher Kubernetes Engine 2, VMWare vSANrancher-vsphere-cpi labels: namespace: kube-system spec: valuesContent: |- vCenter: host: "vcenterhostname" datacenters: "datacentername" username: "xxxxxxxxxxx" password: rancher-vsphere-csi namespace: kube-system spec: valuesContent: |- vCenter: host: "vcenter host" datacenters: "datacenter" username: "xxxxxxx" password: "xxxxxxxxx" insecure-flag = {{ .Values.vCenter.insecureFlag | quote }} [VirtualCenter {{ .Values.vCenter.host | quote }}] datacenters = {{ .Values.vCenter.datacenters | quote }} [Labels]0 码力 | 29 页 | 213.09 KB | 1 年前3
Cloud Native Contrail Networking
Installation and Life Cycle ManagementGuide for Rancher RKE2
Kubernetes control plane and provides the network configuration and network control planes for the host cluster. The Contrail data plane components sit in all nodes and provide the packet send and receive Networking manifests ("Manifests" on page 31) and extract the tgz onto the host where you plan on running the installation. This host must be able to reach the cluster nodes. In the examples in this document feature. NOTE: We use Helm charts to install Contrail Analytics. Install Helm 3.0 or later on the host that you're using to install Contrail Analytics. 1. Locate the Contrail Analytics package that you0 码力 | 72 页 | 1.01 MB | 1 年前3
CIS 1.6 Benchmark - Self-Assessment Guide - Rancher v2.5.4the admission of containers wishing to share the host process ID namespace (Automated) 5.2.3 Minimize the admission of containers wishing to share the host IPC namespace (Automated) 5.2.4 Minimize the admission admission of containers wishing to share the host network namespace (Automated) 5.2.5 Minimize the admission of containers with allowPrivilegeEscalation (Automated) 5.2.6 Minimize the admission of root omitted or set to false. Audit: 5.2.2 Minimize the admission of containers wishing to share the host process ID namespace (Automated) Result: pass Remediation: Create a PSP as described in the Kubernetes0 码力 | 132 页 | 1.12 MB | 1 年前3
共 15 条
- 1
- 2













