1
0
Fork 0
hscloud/cluster/nix
q3k 42553cd044 cluster: disable unauthenticated read only port on kubelets
This port was leaking kubelet state, including information on running
pods. No secrets were leaked (if they were not text-pasted into
env/args), but this still shouldn't be available.

As far as I can tell, nothing depends on this port, other than some
enterprise load balancers that require HTTP for node 'health' checks.

Change-Id: I9549b73e0168fe3ea4dce43cbe8fdc2ca4575961
2019-09-02 16:33:02 +02:00
..
cluster-configuration.nix cluster: disable unauthenticated read only port on kubelets 2019-09-02 16:33:02 +02:00
configuration.sample.nix nix/ -> cluster/nix/ 2019-07-21 15:53:20 +02:00
toplevel.nix nix/ -> cluster/nix/ 2019-07-21 15:53:20 +02:00