CIS Benchmark Rancher Self-Assessment Guide - v2.4
Master Node Security Configuration 1.1 Master Node Configuration Files 1.2 API Server 1.3 Controller Manager 1.4 Scheduler 2 Etcd Node Configuration 2 Etcd Node Configuration Files 3 Control Plane Plane Configuration 3.2 Logging 4 Worker Node Security Configuration 4.1 Worker Node Configuration Files 4.2 Kubelet 5 Kubernetes Policies 5.1 RBAC and Service Accounts 5.2 Pod Security Policies 5 Kubernetes services via Docker containers. Configuration is defined by arguments passed to the container at the time of initialization, not via configuration files. CIS Benchmark Rancher Self-Assessment0 码力 | 54 页 | 447.77 KB | 1 年前3CIS 1.5 Benchmark - Self-Assessment Guide - Rancher v2.5
Master Node Security Configuration 1.1 Master Node Configuration Files 1.2 API Server 1.3 Controller Manager 1.4 Scheduler 2 Etcd Node Configuration 2 Etcd Node Configuration Files 3 Control Plane Plane Configuration 3.2 Logging 4 Worker Node Security Configuration 4.1 Worker Node Configuration Files 4.2 Kubelet 5 Kubernetes Policies 5.1 RBAC and Service Accounts 5.2 Pod Security Policies CIS Kubernetes services via Docker containers. Configuration is defined by arguments passed to the container at the time of initialization, not via configuration files. CIS 1.5 Benchmark - Self-Assessment0 码力 | 54 页 | 447.97 KB | 1 年前3Rancher CIS Kubernetes v.1.4.0 Benchmark Self Assessment
Kubernetes services via Docker containers. Configuration is defined by arguments passed to the container at the time of initialization, not via configuration files. Scoring the commands is different in that the --hostname-override argument is not set (Scored) Controls 1 - Master Node Security Configuration 1.1 - API Server 1.1.1 - Ensure that the --anonymous-auth argument is set to false (Scored) the following files: /etc/kubernetes/admission.yaml /etc/kubernetes/event.yaml See Host Configuration for details. Audit (Admissions plugin) docker inspect kube-apiserver | jq -e '.[0].Args[] |0 码力 | 47 页 | 302.56 KB | 1 年前3CIS 1.6 Benchmark - Self-Assessment Guide - Rancher v2.5.4
CIS 1.6 Kubernetes Benchmark - Rancher v2.5.4 with Kubernetes v1.18 Controls 1.1 Etcd Node Configuration Files 1.1.11 Ensure that the etcd data directory permissions are set to 700 or more restrictive (Automated) 1.4.2 Ensure that the --bind-address argument is set to 127.0.0.1 (Automated) 2 Etcd Node Configuration Files 2.1 Ensure that the --cert-file and --key-file arguments are set as appropriate (Automated) (Automated) 3.2.2 Ensure that the audit policy covers key security concerns (Manual) 4.1 Worker Node Configuration Files 4.1.1 Ensure that the kubelet service file permissions are set to 644 or more restrictive0 码力 | 132 页 | 1.12 MB | 1 年前3SUSE Rancher and RKE Kubernetes cluster using CSI Driver on DELL EMC PowerFlex
....................................................................................... 43 Configuration details ..................................................................................... the PowerFlex family products. In this solution, the RKE cluster is deployed in a two-layer configuration using PowerFlex compute-only nodes that are deployed with the VMware ESXi hypervisor and dedicated provisioned disks on the PowerFlex backend storage. For more information about configuration of PowerFlex nodes, check the Configuration details. The management node hosts the vCenter appliance, PowerFlex Gateway0 码力 | 45 页 | 3.07 MB | 1 年前3[Buyers Guide_DRAFT_REVIEW_V3] Rancher 2.6, OpenShift, Tanzu, Anthos
from the cloud to core and at the edge. Each distribution requires the bare minimum of host configuration, usually no more than a supported version of Docker. For edge deployments, SUSE Rancher does Kubernetes in the most efficient way possible. Kubernetes from SUSE Rancher with RKE uses a configuration syntax designed for clarity and dynamic cluster reconfiguration with no downtime. 3.1.1.2 application clusters happens through the installer GUI or via command-line directives that use a YAML configuration file. Clusters can run on vSphere, Amazon, Microsoft Azure or GCP nodes if operators choose to0 码力 | 39 页 | 488.95 KB | 1 年前3Rancher Hardening Guide Rancher v2.1.x
technology Authors Jason Greathouse Bill Maxwell 1.1 - Rancher HA Kubernetes cluster host configuration 1.1.1 - Configure default sysctl settings on all hosts Profile Applicability Level 1 Description encryption provider configuration on all control plane nodes Profile Applicability Level 1 Description Rancher_Hardening_Guide.md 11/30/2018 3 / 24 Create a Kubernetes encryption configuration file on each each of the RKE nodes that will be provisioned with the controlplane role: Rationale This configuration file will ensure that the Rancher RKE cluster encrypts secrets at rest, which Kubernetes does not0 码力 | 24 页 | 336.27 KB | 1 年前3Cloud Native Contrail Networking Installation and Life Cycle ManagementGuide for Rancher RKE2
deployments • Highly available and resilient network controller overseeing all aspects of the network configuration and control planes • Analytics services using telemetry and industry standard monitoring and facilitates virtual network abstraction, orchestration, and automation. Network configuration plane The network configuration plane interacts with Kubernetes control plane components to manage all CN2 resources the Contrail vRouter. Contrail controller This is the part of CN2 that provides the network configuration and network control plane functionality. This name is purely conceptual – there is no corresponding0 码力 | 72 页 | 1.01 MB | 1 年前3Deploying and ScalingKubernetes with Rancher
provides a single IP address and DNS name by which the pods can be accessed. This load balancing configuration is much easier to manage, and helps scale pods seamlessly. Volume A volume is a directory to change cluster configuration. ©Rancher Labs 2017. All rights Reserved. 24 DEPLOYING AND SCALING KUBERNETES WITH RANCHER You can also generate the configuration file from “Generate AND SCALING KUBERNETES WITH RANCHER You can also add namespaces with simple YAML configuration: apiVersion: v1 kind: Namespace metadata: name: test-namespace ©Rancher0 码力 | 66 页 | 6.10 MB | 1 年前3Rancher Hardening Guide v2.3.5
Namespaces have Network Policies defined Reference Hardened RKE cluster.yml configuration Reference Hardened RKE Template configuration Hardened Reference Ubuntu 18.04 LTS cloud-config: Hardening Guide v2 Self-Assessment Guide - Rancher v2.3.5. Configure Kernel Runtime Parameters The following sysctl configuration is recommended for all nodes type in the cluster. Set the following parameters in /etc/sysctl all namespaces. Reference Hardened RKE cluster.yml configuration The reference cluster.yml is used by the RKE CLI that provides the configuration needed to achieve a hardened install of Rancher Kubernetes0 码力 | 21 页 | 191.56 KB | 1 年前3
共 13 条
- 1
- 2