Configuring security groups
Security groups follow the All traffic that is not allowed is prohibited principle. For a cluster to work:
-
In its security groups, create rules to allow relevant traffic for the cluster nodes:
-
Service traffic within the cluster.
These rules allow intra-cluster communication and connection to the cluster via the Kubernetes API.
Tip
Place each of these rule sets into a separate security group.
This will make it easy to apply these security groups to the cluster and its node groups.
-
-
(Optional) If planning to use a Yandex Application Load Balancer L7 balancer together with the cluster, add rules for the balancer as well.
-
Apply security groups with these rules to the cluster and node groups.
You can specify more detailed rules for your security groups, e.g., to allow traffic only in specific subnets.
Warning
Some products require applying additional rules in security groups. For more information, see guides for the products at hand.
Security groups must be correctly configured for all subnets that will host the cluster. This determines the performance and availability of the cluster and the services running there.
Prior to editing security groups or the settings of any included rules, make sure this is not going to disrupt the cluster or its node groups.
Alert
Do not delete the security groups linked to a running cluster or node group. This may cause prohibition of network traffic and disrupt the operation of the cluster and its nodes.
Creating rules for service traffic
Warning
Rules for service traffic are required for a highly-available cluster to work.
Allowing traffic for a cluster and node groups
For the cluster to work correctly, create rules for incoming and outgoing traffic and apply them to the cluster and node groups:
-
Add rules for incoming traffic that allow:
- Health checks of the network load balancer:
- Port range:
0-65535. - Protocol:
TCP. - Source:
Load balancer healthchecks.
- Port range:
- Transferring service traffic between the master and the nodes:
- Port range:
0-65535. - Protocol:
Any(Any). - Source:
Security group. - Security group:
Current(Self).
- Port range:
- Health checks of nodes using ICMP requests from subnets within Yandex Cloud:
- Protocol:
ICMP. - Source:
CIDR. - CIDR blocks: Address ranges of subnets within Yandex Cloud to health check the cluster from, e.g.:
10.0.0.0/8192.168.0.0/16172.16.0.0/12
- Protocol:
- Health checks of the network load balancer:
-
Add a rule for outgoing service traffic between the master and the nodes:
- Port range:
0-65535. - Protocol:
Any(Any). - Destination name:
Security group. - Security group:
Current(Self).
- Port range:
Note
If using a highly available master, allow traffic to the CIDRs of the subnets where the master hosts are located or to the cluster CIDR for node groups. This is required for transmitting service traffic between the master and nodes.
Allowing traffic for node groups
For node groups to run properly, create rules for incoming and outgoing traffic and apply them to node groups:
-
Add a rule for incoming traffic that allows traffic transfer between pods and services:
- Port range:
0-65535. - Protocol:
Any(Any). - Source:
CIDR. - CIDR blocks: CIDRs of the cluster and services, e.g.,
10.96.0.0/16and10.112.0.0/16.
- Port range:
-
Add a rule for outgoing traffic that allows node group nodes to connect to external resources, e.g., to download images from Docker Hub or work with Yandex Object Storage:
- Port range:
0-65535. - Protocol:
Any(Any). - Destination name:
CIDR. - CIDR blocks:
0.0.0.0/0.
Note
If you are using a highly available master and do not want to allow nodes to connect to any addresses (CIDR:
0.0.0.0/0), allow outgoing traffic to the CIDRs of the subnets where the master hosts are located or to the cluster CIDR. This ensures node access to the master.Examples
-
Access to the cluster CIDR:
- Port range:
0-65535. - Protocol:
Any(Any). - Destination name:
CIDR. - CIDR blocks:
10.131.0.32/32.
- Port range:
-
Access to the CIDRs of subnets with master hosts:
- Port range:
0-65535. - Protocol:
Any(Any). - Destination name:
CIDR. - CIDR blocks:
10.128.0.0/24,10.129.0.0/24,10.131.0.0/24.
- Port range:
- Port range:
Allowing traffic for cluster
For the cluster to work correctly and to allow incoming connections, create rules for incoming and outgoing traffic and apply them to the cluster:
-
Add rules for incoming traffic that allow connecting to the master via ports
6443and443. This will allow you to access the Kubernetes API and manage the cluster usingkubectland other utilities.Create two rules for incoming traffic, one per port:
- Port range:
443,6443. - Protocol:
TCP. - Source:
CIDR. - CIDR blocks: Specify the IP address range of the subnets you will manage the cluster from, e.g.:
85.23.23.22/32: For an external network.192.168.0.0/24: For an internal network.
- Port range:
-
Add rules for outgoing traffic that allow:
-
Traffic between the master and
metric-serverpods:- Port range:
4443. - Protocol:
TCP. - Destination name:
CIDR. - CIDR blocks: Specify the cluster CIDR, e.g.,
10.96.0.0/16.
- Port range:
-
Master host connection to NTP servers for time syncing:
- Port range:
123. - Protocol:
UDP. - Destination name:
CIDR. - CIDR blocks:
0.0.0.0/0.
- Port range:
-
Creating a rule for connecting to services from the internet
To be sure that the services running on nodes are accessible from the internet and subnets within Yandex Cloud, create a rule for the incoming traffic and apply it to the node group:
- Port range:
30000-32767. - Protocol:
TCP. - Source:
CIDR. - CIDR blocks:
0.0.0.0/0.
Creating a rule for connecting to nodes via SSH
To access the nodes via SSH, create a rule for incoming traffic and apply it to the node group:
- Port range:
22. - Protocol:
TCP. - Source:
CIDR. - CIDR blocks: IP address ranges of subnets within Yandex Cloud and public IP addresses of computers on the internet, for example:
10.0.0.0/8192.168.0.0/16172.16.0.0/1285.32.32.22/32
Applying security groups with rules
Depending on the rules the security groups contain, these groups must be assigned to a cluster or node group:
| Security group | Object to assign the group to |
|---|---|
| Group allowing traffic for a cluster and node groups | Cluster and node group |
| Group allowing traffic for node groups | Node group |
| Group allowing traffic for a cluster | Cluster |
| Group allowing connection to services from the internet | Node group |
| Group allowing connection to nodes via SSH | Node group |
Examples of rules
Security groups for a Managed Service for Kubernetes cluster
Let’s assume you want to create a Kubernetes cluster which:
-
Uses the following configuration:
- A highly-available master in the
ru-central1-a,ru-central1-b, andru-central1-davailability zones. - A node group named
worker-nodes-ain theru-central1-aavailability zone. - Cluster CIDR:
10.96.0.0/16; CIDR of services:10.112.0.0/16.
- A highly-available master in the
-
Follows these traffic exchange policies:
-
Health checks of nodes using ICMP requests are allowed from the following subnets within Yandex Cloud:
10.0.0.0/8172.16.0.0/12192.168.0.0/16
-
Connections to services from the internet are allowed from any addresses:
0.0.0.0/0. -
Connections to nodes via SSH are allowed from the only address:
85.32.32.22/32. -
Access to the Kubernetes API is allowed from the only subnet:
203.0.113.0/24.
-
To create such a cluster:
-
Create a security group named
k8s-cluster-nodegroup-trafficthat allows traffic for a cluster and node groups:yc vpc security-group create \ --name k8s-cluster-nodegroup-traffic \ --network-id <cloud_network_ID> \ --rule "description=healthchecks,direction=ingress,protocol=tcp,from-port=0,to-port=65535,predefined=loadbalancer_healthchecks" \ --rule "description=master-nodes,direction=ingress,protocol=any,from-port=0,to-port=65535,predefined=self_security_group" \ --rule "description=icmp,direction=ingress,protocol=icmp,v4-cidrs=[10.0.0.0/8,172.16.0.0/12,192.168.0.0/16]" \ --rule "description=master-nodes-outgoing,direction=egress,protocol=any,from-port=0,to-port=65535,predefined=self_security_group" -
Create a security group named
k8s-nodegroup-trafficthat allows traffic for node groups:yc vpc security-group create \ --name k8s-nodegroup-traffic \ --network-id <cloud_network_ID> \ --rule "description=pods-services,direction=ingress,protocol=any,from-port=0,to-port=65535,v4-cidrs=[10.96.0.0/16,10.112.0.0/16]" \ --rule "description=nodes-external-resources,direction=egress,protocol=any,from-port=0,to-port=65535,v4-cidrs=[0.0.0.0/0]" -
Create a security group named
k8s-cluster-trafficthat allows traffic for a cluster:yc vpc security-group create \ --name k8s-cluster-traffic \ --network-id <cloud_network_ID> \ --rule "description=api-443,direction=ingress,protocol=tcp,port=443,v4-cidrs=[203.0.113.0/24]" \ --rule "description=api-6443,direction=ingress,protocol=tcp,port=6443,v4-cidrs=[203.0.113.0/24]" \ --rule "description=metric-server,direction=egress,protocol=tcp,port=4443,v4-cidrs=[10.96.0.0/16]" \ --rule "description=ntp-server,direction=egress,protocol=udp,port=123,v4-cidrs=[0.0.0.0/0]" -
Create a security group named
k8s-services-accessthat allows connection to services from the internet:yc vpc security-group create \ --name k8s-services-access \ --network-id <cloud_network_ID> \ --rule "description=services-incoming,direction=ingress,protocol=tcp,from-port=30000,to-port=32767,v4-cidrs=[0.0.0.0/0]" -
Create a security group named
k8s-ssh-accessthat allows connection to nodes over SSH:yc vpc security-group create \ --name k8s-ssh-access \ --network-id <cloud_network_ID> \ --rule "description=ssh-access,direction=ingress,protocol=tcp,port=22,v4-cidrs=[85.32.32.22/32]" -
Create a cluster and assign it the
k8s-cluster-nodegroup-trafficandk8s-cluster-trafficsecurity groups:yc managed-kubernetes cluster create \ --name k8s-cluster \ --network-id <cloud_network_ID> \ --service-account-id <service_account_ID_for_cluster> \ --node-service-account-id <serivce_account_ID_for_node_group> \ --cluster-ipv4-range 10.96.0.0/16 \ --service-ipv4-range 10.112.0.0/16 \ --public-ip \ --master-location zone=ru-central1-a,subnet-id=<cloud_subnet_ID_in_ru-central1-a_zone> \ --master-location zone=ru-central1-b,subnet-id=<cloud_subnet_ID_in_ru-central1-b_zone> \ --master-location zone=ru-central1-d,subnet-id=<cloud_subnet_ID_in_ru-central1-d_zone> \ --security-group-ids <k8s-cluster-nodegroup-traffic_ID>,<k8s-cluster-traffic_ID>You can get the security group ID together with info on the security group.
-
Create a node group and assign it the
k8s-cluster-nodegroup-traffic,k8s-nodegroup-traffic,k8s-services-access, andk8s-ssh-accesssecurity groups:yc managed-kubernetes node-group create \ --name worker-nodes-a \ --cluster-id <cluster_ID> \ --location zone=ru-central1-a \ --fixed-size 1 \ --network-interface subnets=<subnet_ID_in_ru-central1-a>,ipv4-address=nat,security-group-ids=[<k8s-cluster-nodegroup-traffic_ID>,<k8s-nodegroup-traffic_ID>,<k8s-services-access_ID>,<k8s-ssh-access_ID>]You can get the security group ID together with info on the security group.
-
Create security groups with the required rules:
resource "yandex_vpc_security_group" "k8s-cluster-nodegroup-traffic" { name = "k8s-cluster-nodegroup-traffic" description = "The group rules allow service traffic for the cluster and node groups. Apply it to the cluster and node groups." network_id = "<cloud_network_ID>" ingress { description = "Rule for health checks of the network load balancer." from_port = 0 to_port = 65535 protocol = "TCP" predefined_target = "loadbalancer_healthchecks" } ingress { description = "Rule for incoming service traffic between the master and the nodes." from_port = 0 to_port = 65535 protocol = "ANY" predefined_target = "self_security_group" } ingress { description = "Rule for health checks of nodes using ICMP requests from subnets within Yandex Cloud." protocol = "ICMP" v4_cidr_blocks = ["10.0.0.0/8", "172.16.0.0/12", "192.168.0.0/16"] } egress { description = "Rule for outgoing service traffic between the master and the nodes." from_port = 0 to_port = 65535 protocol = "ANY" predefined_target = "self_security_group" } } resource "yandex_vpc_security_group" "k8s-nodegroup-traffic" { name = "k8s-nodegroup-traffic" description = "The group rules allow service traffic for node groups. Apply it to node groups." network_id = "<cloud_network_ID>" ingress { description = "Rule for incoming traffic that allows traffic transfer between pods and services." from_port = 0 to_port = 65535 protocol = "ANY" v4_cidr_blocks = ["10.96.0.0/16", "10.112.0.0/16"] } egress { description = "Rule for outgoing traffic that allows node group nodes to connect to external resources." from_port = 0 to_port = 65535 protocol = "ANY" v4_cidr_blocks = ["0.0.0.0/0"] } } resource "yandex_vpc_security_group" "k8s-services-access" { name = "k8s-services-access" description = "The group rules allow connections to services from the internet. Apply it to node groups." network_id = "<cloud_network_ID>" ingress { description = "Rule for incoming traffic that allows connection to services." from_port = 30000 to_port = 32767 protocol = "TCP" v4_cidr_blocks = ["0.0.0.0/0"] } } resource "yandex_vpc_security_group" "k8s-ssh-access" { name = "k8s-ssh-access" description = "The group rules allow connection to nodes via SSH. Apply it to node groups." network_id = "<cloud_network_ID>" ingress { description = "Rule for incoming traffic that allows connection to nodes via SSH." port = 22 protocol = "TCP" v4_cidr_blocks = ["85.32.32.22/32"] } } resource "yandex_vpc_security_group" "k8s-cluster-traffic" { name = "k8s-cluster-traffic" description = "The group rules allow traffic for the cluster. Apply it to the cluster." network_id = "<cloud_network_ID>" ingress { description = "Rule for incoming traffic that allows access to the Kubernetes API (port 443)." port = 443 protocol = "TCP" v4_cidr_blocks = ["203.0.113.0/24"] } ingress { description = "Rule for incoming traffic that allows access to the Kubernetes API (port 6443)." port = 6443 protocol = "TCP" v4_cidr_blocks = ["203.0.113.0/24"] } egress { description = "Rule for outgoing traffic that allows traffic transfer between the master and metric-server pods." port = 4443 protocol = "TCP" v4_cidr_blocks = ["10.96.0.0/16"] } egress { description = "Rule for outgoing traffic to allow master host connection to NTP servers for time syncing." port = 123 protocol = "UDP" v4_cidr_blocks = ["0.0.0.0/0"] } } -
Create a cluster with a node group and apply the security groups with rules as follows:
resource "yandex_kubernetes_cluster" "k8s-cluster" { name = "k8s-cluster" service_account_id = "<service_account_ID_for_cluster>" node_service_account_id = "<service_account_ID_for_node_groups>" cluster_ipv4_range = "10.96.0.0/16" service_ipv4_range = "10.112.0.0/16" network_id = "<cloud_network_ID>" master { master_location { zone = "ru-central1-a" subnet_id = "<cloud_subnet_ID_in_zone>" } master_location { zone = "ru-central1-b" subnet_id = "<cloud_subnet_ID_in_zone>" } master_location { zone = "ru-central1-d" subnet_id = "<cloud_subnet_ID_in_zone>" } security_group_ids = [ yandex_vpc_security_group.k8s-cluster-nodegroup-traffic.id, yandex_vpc_security_group.k8s-cluster-traffic.id ] public_ip = true } } resource "yandex_kubernetes_node_group" "worker-nodes-a" { cluster_id = yandex_kubernetes_cluster.k8s-cluster.id name = "worker-nodes-a" allocation_policy { location { zone = "ru-central1-a" } } scale_policy { fixed_scale { size = 1 } } instance_template { network_interface { nat = true subnet_ids = [<cloud_subnet_ID>] security_group_ids = [ yandex_vpc_security_group.k8s-cluster-nodegroup-traffic.id, yandex_vpc_security_group.k8s-nodegroup-traffic.id, yandex_vpc_security_group.k8s-services-access.id, yandex_vpc_security_group.k8s-ssh-access.id ] } } }
Security groups for an Application Load Balancer and Managed Service for Kubernetes cluster
Let's assume you need to create rules for the following conditions:
- You need to deploy a load balancer with a public IP address accepting HTTPS traffic in three subnets. These subnets' CIDR blocks are
10.128.0.0/24,10.129.0.0/24, and10.130.0.0/24. - The cluster's CIDR block is
10.96.0.0/16and the service CIDR block is10.112.0.0/16. These were specified when creating the cluster. - The cluster's node group resides in a subnet with the
10.140.0.0/24CIDR block. - SSH access to nodes and cluster management via API,
kubectland other utilities are restricted to203.0.113.0/24.
Create the following security groups and rules:
locals {
network-id = "<cloud_network_ID>"
}
resource "yandex_vpc_security_group" "alb" {
description = "Load balancer security group"
name = "alb"
network_id = local.network-id
ingress {
description = "Rule to allow incoming HTTP traffic"
port = 80
protocol = "TCP"
v4_cidr_blocks = ["0.0.0.0/0"]
}
ingress {
description = "Rule to allow incoming HTTPS traffic"
port = 443
protocol = "TCP"
v4_cidr_blocks = ["0.0.0.0/0"]
}
ingress {
description = "Rule for load balancer node health checks"
port = 30080
protocol = "TCP"
predefined_target = "loadbalancer_healthchecks"
}
egress {
description = "Rule for sending traffic to nodes, including health checks"
from_port = 0
to_port = 65535
protocol = "TCP"
v4_cidr_blocks = ["10.140.0.0/24"]
}
}
resource "yandex_vpc_security_group" "nodegroup-backend" {
description = "Node group's security group for backend health checks"
name = "nodegroup-backend"
network_id = local.network-id
ingress {
description = "Backend health check rule"
port = 10501
protocol = "TCP"
v4_cidr_blocks = ["10.128.0.0/24", "10.129.0.0/24", "10.130.0.0/24"]
}
}
resource "yandex_vpc_security_group" "k8s-cluster-nodegroup-traffic" {
description = "Cluster and node group's security group for service traffic"
name = "k8s-cluster-nodegroup-traffic"
network_id = local.network-id
ingress {
description = "Network load balancer rule"
from_port = 0
to_port = 65535
protocol = "TCP"
predefined_target = "loadbalancer_healthchecks"
}
ingress {
description = "Rule for traffic between the master and nodes"
from_port = 0
to_port = 65535
protocol = "ANY"
predefined_target = "self_security_group"
}
ingress {
description = "Rule for health checks of nodes from subnets within Yandex Cloud"
from_port = 0
to_port = 65535
protocol = "IPV6_ICMP"
v4_cidr_blocks = ["10.0.0.0/8", "192.168.0.0/16", "172.16.0.0/12"]
}
egress {
description = "Rule for traffic between the master and nodes"
from_port = 0
to_port = 65535
protocol = "ANY"
predefined_target = "self_security_group"
}
}
resource "yandex_vpc_security_group" "nodegroup-traffic" {
description = "Node group's security group for service traffic"
name = "nodegroup-traffic"
network_id = local.network-id
ingress {
description = "Rule for traffic between pods and services"
from_port = 0
to_port = 65535
protocol = "ANY"
v4_cidr_blocks = ["10.96.0.0/16", "10.112.0.0/16"]
}
egress {
description = "Rule for external resource access"
from_port = 0
to_port = 65535
protocol = "ANY"
v4_cidr_blocks = ["0.0.0.0/0"]
}
}
resource "yandex_vpc_security_group" "k8s-cluster-traffic" {
description = "Cluster security group for control plane traffic"
name = "k8s-cluster-traffic"
network_id = local.network-id
ingress {
description = "Rule for access to the Kubernetes API"
port = 443
protocol = "TCP"
v4_cidr_blocks = ["203.0.113.0/24"]
}
ingress {
description = "Rule for access to the Kubernetes API"
port = 6443
protocol = "TCP"
v4_cidr_blocks = ["203.0.113.0/24"]
}
egress {
description = "Rule for traffic between the master and metric-server pods"
port = 4443
protocol = "TCP"
v4_cidr_blocks = ["10.96.0.0/16"]
}
}
resource "yandex_vpc_security_group" "nodegroup-services-access" {
description = "Node group's security group for accessing services from the internet"
name = "nodegroup-services-access"
network_id = local.network-id
ingress {
description = "Rules for accessing services from the internet and Yandex Cloud subnets"
from_port = 30000
to_port = 32767
protocol = "TCP"
v4_cidr_blocks = ["0.0.0.0/0"]
}
}
resource "yandex_vpc_security_group" "nodegroup-ssh" {
description = "Node group's security group for SSH access to nodes"
name = "nodegroup-ssh"
network_id = local.network-id
ingress {
description = "Rules for SSH access to nodes"
port = 22
protocol = "TCP"
v4_cidr_blocks = ["203.0.113.0/24"]
}
}