For AI agents: A markdown version of this page is available at https://docs.datadoghq.com/security/default_rules/def-000-be9.md. A documentation index is available at /llms.txt.

A GKE Cluster's Kubelet's read-only port should be disabled

Description

The read-only port should be disabled so unauthenticated users cannot retrieve potentially sensitive information about the cluster.

Remediation

Choose a remediation method from below. For both steps, a restart of the Kubelet service is required.

Kubelet config file

  1. Add the json below to this file: /etc/kubernetes/kubelet/kubelet-config.json
"readOnlyPort": 0

Executable arguments

  1. Edit the Kubelet service file on each worker node and ensure the below parameters are part of the KUBELET_ARGS variable string.
--read-only-port=0