A GKE Cluster's Kubelet should only allow explicitly authorized requests

이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Description

Kubelets can be configured to allow all authenticated requests (even anonymous ones) without needing explicit authorization checks from the apiserver. You should restrict this behavior and only allow explicitly authorized requests.

Remediation

Choose a remediation method from below. For both steps, a restart of the Kubelet service is required.

Kubelet config file

  1. Add the json below to this file: /etc/kubernetes/kubelet/kubelet-config.json
"authentication": { "webhook": { "enabled": true } }
"authorization": { "mode": "Webhook" }

Executable arguments

  1. Edit the kubelet service file on each worker node and ensure the below parameters are part of the KUBELET_ARGS variable string.
--authentication-token-webhook
--authorization-mode=Webhook