SUSE Rancher and RKE Kubernetes cluster
using CSI Driver on DELL EMC PowerFlex ssh-keygen The following files are created after SSH key pairing: $HOME/.ssh/id_rsa (SSH private key, keep this secure) $HOME/.ssh/id_rsa.pub (SSH public key) 6. Run the following command to copy the the Kubernetes nodes to provide access to the nodes, using the created SSH key pair: $ cat .ssh/id_rsa.pub | ssh node1 "cat >> .ssh/authorized_keys" 7. Run the following command to test the SSH VM, replacing the 'hostname' with each of the Kubernetes nodes IP or hostname: $ ssh -i $HOME/.ssh/id_rsa@ docker version Installation of the SUSE Rancher Kubernetes cluster 0 码力 | 45 页 | 3.07 MB | 1 年前3
Hardening Guide - Rancher v2.3.3+t h e etcd u s e r : useradd -c "Etcd user" -d /var/lib/etcd etcd R e c or d t h e u i d /gi d : id etcd • Ad d t h e f ol l ow i n g t o t h e R K E cluster.yml e t c d s e c t i on u n d e r services: #!/bin/bash for i in $(curl -sk -u 'token-<id>:' https:// /v3/users|jq -r .data[].links.globalRoleBindings); do curl -sk -u 'token-<id>: ' $i| jq '.data[] | "\(.userId) \( l at e f or k 8s 1. 14” % }} # # Cluster Config # answers: {} default_pod_security_policy_template_id: restricted docker_root_dir: /var/lib/docker enable_cluster_alerting: false enable_cluster_monitoring: 0 码力 | 44 页 | 279.78 KB | 1 年前3
Rancher Hardening Guide v2.4be provided when registering the custom nodes. When setting the default_pod_security_policy_template_id: to restricted Rancher creates RoleBindings and ClusterRoleBindings on the default service accounts kubernetes_version: "v1.15.9-rancher1-1" enable_network_policy: true default_pod_security_policy_template_id: "restricted" services: etcd: uid: 52034 gid: 52034 kube-api: pod_security_policy: details. # # Cluster Config # Hardening Guide v2.4 14 default_pod_security_policy_template_id: restricted docker_root_dir: /var/lib/docker enable_cluster_alerting: false enable_cluster_monitoring:0 码力 | 22 页 | 197.27 KB | 1 年前3
Rancher Hardening Guide Rancher v2.1.xprivileged containers (Not Scored) 1.7.2 - Do not admit containers wishing to share the host process ID namespace (Not Scored) 1.7.3 - Do not admit containers wishing to share the host IPC namespace (Not /bin/bash for i in $(curl -sk -u 'token-<id>:' https:// /v3/users|jq -r .data[].links.globalRoleBindings); do curl -sk -u 'token-<id>: ' $i| jq '.data[] | "\(.userId) \ 0 码力 | 24 页 | 336.27 KB | 1 年前3
Rancher Hardening Guide v2.3.5kubernetes_version: "v1.15.9-rancher1-1" enable_network_policy: true default_pod_security_policy_template_id: "restricted" services: etcd: uid: 52034 gid: 52034 kube-api: pod_security_policy: installation and RKE Template details. # # Cluster Config # default_pod_security_policy_template_id: restricted docker_root_dir: /var/lib/docker enable_cluster_alerting: false enable_cluster_monitoring:0 码力 | 21 页 | 191.56 KB | 1 年前3
Rancher Kubernetes Engine 2, VMWare vSANfollowing data: user on vSphere/vSAN with the necessary access rights vCenter hostname datacenter ID ClusterID vSAN url / datastorage url You should obtain this information from the VMware vSphere/vSAN insecure: true configSecret: configTemplate: | [Global] cluster-id = {{ required ".Values.vCenter.clusterId must be provided" (default .Values.vCenter.clusterId .Values0 码力 | 29 页 | 213.09 KB | 1 年前3
CIS 1.6 Benchmark - Self-Assessment Guide - Rancher v2.5.4privileged containers (Manual) 5.2.2 Minimize the admission of containers wishing to share the host process ID namespace (Automated) 5.2.3 Minimize the admission of containers wishing to share the host IPC namespace set to false. Audit: 5.2.2 Minimize the admission of containers wishing to share the host process ID namespace (Automated) Result: pass Remediation: Create a PSP as described in the Kubernetes documentation0 码力 | 132 页 | 1.12 MB | 1 年前3
企业云原生的探索与落地深圳沙龙-RacherLabs-20-11-14/小程序+容器:前端后端全链路敏捷化支持根据 设备特征创建发布; • 各种发布规则灵活组合,不仅能实现传统意义 上的灰度覆盖发布,更能实现灵活、多样的业 务发布目标 1. 设备信息 2. 系统版本 3. 网络情况 4. 设备ID(IMEI等) 5. 地理位置 6. 应用名称及版本情况 7. 小程序版本 基础数据 用户行为数据 1. 进入/离开页面时间 2. 小程序切换动作 3. 页面渲染时间 4. 获取数据时延0 码力 | 27 页 | 3.74 MB | 1 年前3
Rancher CIS Kubernetes v.1.4.0 Benchmark Self
AssessmentReturned Value: null Result: Pass 1.7.2 - Do not admit containers wishing to share the host process ID namespace (Scored) Notes The restricted PodSecurityPolicy is available to all ServiceAccounts. Audit0 码力 | 47 页 | 302.56 KB | 1 年前3
CIS Benchmark Rancher Self-Assessment Guide - v2.4Pod Security Policies 5.2.2 Minimize the admission of containers wishing to share the host process ID namespace (Scored) Result: PASS Remediation: Create a PSP as described in the Kubernetes documentation0 码力 | 54 页 | 447.77 KB | 1 年前3
共 13 条
- 1
- 2













