Yandex Cloud
Search
Contact UsTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
  • Marketplace
    • Featured
    • Infrastructure & Network
    • Data Platform
    • AI for business
    • Security
    • DevOps tools
    • Serverless
    • Monitoring & Resources
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2026 Direct Cursus Technology L.L.C.
Yandex Managed Service for Kubernetes
  • Comparing with other Yandex Cloud services
  • Getting started
    • All guides
    • Connecting to a node over SSH
    • Connecting to a node via OS Login
    • Updating Kubernetes
    • Configuring autoscaling
    • Activating a Kubernetes Terraform provider
    • Installing applications from Yandex Cloud Marketplace using Terraform
      • Connection method overview
      • Configuring security groups
      • Creating a static configuration file
  • Access management
  • Pricing policy
  • Terraform reference
  • Monitoring metrics
  • Audit Trails events
  • Release notes

In this article:

  • Creating rules for service traffic
  • Allowing traffic for a cluster and node groups
  • Allowing traffic for node groups
  • Allowing traffic for a cluster
  • Creating a rule for connecting to services from the internet
  • Creating a rule for connecting to nodes over SSH
  • Applying security groups with rules
  • Examples of rules
  • Security groups for a Managed Service for Kubernetes cluster
  • Security groups for an L7 Application Load Balancer and Managed Service for Kubernetes cluster
  1. Step-by-step guides
  2. Connecting to a cluster
  3. Configuring security groups

Configuring security groups

Written by
Yandex Cloud
Updated at December 19, 2025
  • Creating rules for service traffic
    • Allowing traffic for a cluster and node groups
    • Allowing traffic for node groups
    • Allowing traffic for a cluster
  • Creating a rule for connecting to services from the internet
  • Creating a rule for connecting to nodes over SSH
  • Applying security groups with rules
  • Examples of rules
    • Security groups for a Managed Service for Kubernetes cluster
    • Security groups for an L7 Application Load Balancer and Managed Service for Kubernetes cluster

Security groups follow the All traffic that is not allowed is prohibited principle. For a cluster to work:

  1. In its security groups, create rules to allow relevant traffic for the cluster nodes:

    • Service traffic within the cluster.

      These rules allow intra-cluster communication and connection to the cluster via the Kubernetes API.

    • Connections to services from the internet.

    • Connections to nodes over SSH.

    Tip

    Place each of these rule sets into a separate security group.

    This will make it easy to apply these security groups to the cluster and its node groups.

  2. Optionally, if you are going to use an L7 Yandex Application Load Balancer together with the cluster, add rules for the balancer as well.

  3. Apply security groups with these rules to the cluster and its node groups.

You can specify more granular rules for your security groups, e.g., to allow traffic only in specific subnets.

Warning

Some products require applying additional rules in security groups. For more information, see guides for the products at hand.

You must configure security groups correctly for all subnets that will host the cluster. This determines the performance and availability of the cluster and services running in it.

Prior to editing the list of security groups or settings of any included rules, make sure this will not disrupt the cluster or its node groups.

Alert

Do not delete the security groups associated with a running cluster or node group. This may result in prohibition of network traffic and disrupt the operation of the cluster and its nodes.

Creating rules for service trafficCreating rules for service traffic

Warning

Rules for service traffic are required for a highly available cluster to work.

Allowing traffic for a cluster and node groupsAllowing traffic for a cluster and node groups

For the cluster to work correctly, create rules for incoming and outgoing traffic and apply them to the cluster and its node groups:

  1. Add rules for incoming traffic that allow:

    • Health checks of the network load balancer:
      • Port range: 0-65535.
      • Protocol: TCP.
      • Source: Load balancer healthchecks.
    • Transmitting service traffic between the master and nodes:
      • Port range: 0-65535.
      • Protocol: Any (Any).
      • Source: Security group.
      • Security group: Current (Self).
    • Health checks of nodes using ICMP messages from subnets within Yandex Cloud:
      • Protocol: ICMP.
      • Source: CIDR.
      • CIDR blocks: Address ranges of subnets within Yandex Cloud for health checks, e.g.:
        • 10.0.0.0/8
        • 192.168.0.0/16
        • 172.16.0.0/12
  2. Add a rule for outgoing service traffic between the master and nodes:

    • Port range: 0-65535.
    • Protocol: Any (Any).
    • Destination name: Security group.
    • Security group: Current (Self).

Note

If using a highly available master, allow traffic to the CIDRs of the subnets where the master hosts are located, or to the cluster CIDR for node groups. This is required for transmitting service traffic between the master and nodes.

Allowing traffic for node groupsAllowing traffic for node groups

For node groups to run properly, create rules for incoming and outgoing traffic and apply them to the node groups:

  1. Add an incoming traffic rule that allows traffic transfer between pods and services:

    • Port range: 0-65535.
    • Protocol: Any (Any).
    • Source: CIDR.
    • CIDR blocks: CIDRs of the cluster and services, e.g., 10.96.0.0/16 and 10.112.0.0/16.
  2. Add an outgoing traffic rule that allows node group nodes to connect to external resources, e.g., Container Registry, Cloud Registry, or Docker Hub Docker image registries, as well as the Object Storage buckets:

    • Port range: 0-65535.
    • Protocol: Any (Any).
    • Destination name: CIDR.
    • CIDR blocks: 0.0.0.0/0.

    Note

    If you are using a highly available master and do not want to allow nodes to connect to any addresses (CIDR: 0.0.0.0/0), allow outgoing traffic to the CIDRs of subnets where the master hosts are located or to the cluster CIDR. This ensures node access to the master.

    Examples
    • Access to the cluster CIDR:

      • Port range: 0-65535.
      • Protocol: Any (Any).
      • Destination name: CIDR.
      • CIDR blocks: 10.131.0.32/32.
    • Access to the CIDRs of subnets with master hosts:

      • Port range: 0-65535.
      • Protocol: Any (Any).
      • Destination name: CIDR.
      • CIDR blocks: 10.128.0.0/24, 10.129.0.0/24, 10.131.0.0/24.

Allowing traffic for a clusterAllowing traffic for a cluster

For the cluster to work correctly and to allow incoming connections, create rules for incoming and outgoing traffic and apply them to the cluster:

  1. Add the rules for incoming traffic that allow connecting to the master on ports 6443 and 443. This will allow you to access the Kubernetes API and manage the cluster using kubectl and other utilities.

    Create two rules for incoming traffic, one per port:

    • Port range: 443, 6443.
    • Protocol: TCP.
    • Source: CIDR.
    • CIDR blocks: Specify the IP address range of the subnets you will manage the cluster from, e.g.:
      • 85.23.23.22/32: For an external network.
      • 192.168.0.0/24: For an internal network.
  2. Add rules for outgoing traffic that allow:

    • Traffic between the master and metric-server pods:

      • Port range: 4443.
      • Protocol: TCP.
      • Destination name: CIDR.
      • CIDR blocks: Specify the cluster CIDR, e.g., 10.96.0.0/16.
    • Master host connection to NTP servers for time syncing:

      • Port range: 123.
      • Protocol: UDP.
      • Destination name: CIDR.
      • CIDR blocks: 0.0.0.0/0.

Creating a rule for connecting to services from the internetCreating a rule for connecting to services from the internet

To ensure the services running on nodes are accessible from the internet and subnets within Yandex Cloud, create a rule for incoming traffic and apply it to the node group:

  • Port range: 30000-32767.
  • Protocol: TCP.
  • Source: CIDR.
  • CIDR blocks: 0.0.0.0/0.

Creating a rule for connecting to nodes over SSHCreating a rule for connecting to nodes over SSH

To access nodes over SSH, create a rule for incoming traffic and apply it to the node group:

  • Port range: 22.
  • Protocol: TCP.
  • Source: CIDR.
  • CIDR blocks: IP address ranges of subnets within Yandex Cloud and public IP addresses of computers on the internet, e.g.:
    • 10.0.0.0/8
    • 192.168.0.0/16
    • 172.16.0.0/12
    • 85.32.32.22/32

Applying security groups with rulesApplying security groups with rules

Depending on the rules the security groups contain, these groups must be associated with a cluster or node group:

Security group Object to associate the group with
Group allowing traffic for a cluster and node groups Cluster and node group
Group allowing traffic for node groups Node group
Group allowing traffic for a cluster Cluster
Group allowing connections to services from the internet Node group
Group allowing connections to nodes over SSH Node group

Examples of rulesExamples of rules

Security groups for a Managed Service for Kubernetes clusterSecurity groups for a Managed Service for Kubernetes cluster

Let’s assume you want to create a Kubernetes cluster which:

  • Uses the following configuration:

    • Highly available master in the ru-central1-a, ru-central1-b, and ru-central1-d availability zones.
    • Node group named worker-nodes-a in the ru-central1-a availability zone.
    • Cluster CIDR: 10.96.0.0/16; CIDR of services: 10.112.0.0/16.
  • Follows these traffic exchange policies:

    • Health checks of nodes using ICMP messages are allowed from the following subnets within Yandex Cloud:

      • 10.0.0.0/8
      • 172.16.0.0/12
      • 192.168.0.0/16
    • Connections to services from the internet are allowed from any addresses: 0.0.0.0/0.

    • Connections to nodes over SSH are allowed from the only address: 85.32.32.22/32.

    • Access to the Kubernetes API is allowed from the only subnet: 203.0.113.0/24.

To create such a cluster:

CLI
Terraform
  1. Create a security group named k8s-cluster-nodegroup-traffic that allows traffic for a cluster and node groups:

    yc vpc security-group create \
      --name k8s-cluster-nodegroup-traffic \
      --network-id <cloud_network_ID> \
      --rule "description=healthchecks,direction=ingress,protocol=tcp,from-port=0,to-port=65535,predefined=loadbalancer_healthchecks" \
      --rule "description=master-nodes,direction=ingress,protocol=any,from-port=0,to-port=65535,predefined=self_security_group" \
      --rule "description=icmp,direction=ingress,protocol=icmp,v4-cidrs=[10.0.0.0/8,172.16.0.0/12,192.168.0.0/16]" \
      --rule "description=master-nodes-outgoing,direction=egress,protocol=any,from-port=0,to-port=65535,predefined=self_security_group"
    
  2. Create a security group named k8s-nodegroup-traffic that allows traffic for node groups:

    yc vpc security-group create \
      --name k8s-nodegroup-traffic \
      --network-id <cloud_network_ID> \
      --rule "description=pods-services,direction=ingress,protocol=any,from-port=0,to-port=65535,v4-cidrs=[10.96.0.0/16,10.112.0.0/16]" \
      --rule "description=nodes-external-resources,direction=egress,protocol=any,from-port=0,to-port=65535,v4-cidrs=[0.0.0.0/0]"
    
  3. Create a security group named k8s-cluster-traffic that allows traffic for a cluster:

    yc vpc security-group create \
      --name k8s-cluster-traffic \
      --network-id <cloud_network_ID> \
      --rule "description=api-443,direction=ingress,protocol=tcp,port=443,v4-cidrs=[203.0.113.0/24]" \
      --rule "description=api-6443,direction=ingress,protocol=tcp,port=6443,v4-cidrs=[203.0.113.0/24]" \
      --rule "description=metric-server,direction=egress,protocol=tcp,port=4443,v4-cidrs=[10.96.0.0/16]" \
      --rule "description=ntp-server,direction=egress,protocol=udp,port=123,v4-cidrs=[0.0.0.0/0]"
    
  4. Create a security group named k8s-services-access that allows connections to services from the internet:

    yc vpc security-group create \
      --name k8s-services-access \
      --network-id <cloud_network_ID> \
      --rule "description=services-incoming,direction=ingress,protocol=tcp,from-port=30000,to-port=32767,v4-cidrs=[0.0.0.0/0]"
    
  5. Create a security group named k8s-ssh-access that allows connections to nodes over SSH:

    yc vpc security-group create \
      --name k8s-ssh-access \
      --network-id <cloud_network_ID> \
      --rule "description=ssh-access,direction=ingress,protocol=tcp,port=22,v4-cidrs=[85.32.32.22/32]"
    
  6. Create a cluster and associate it with the k8s-cluster-nodegroup-traffic and k8s-cluster-traffic security groups:

    yc managed-kubernetes cluster create \
      --name k8s-cluster \
      --network-id <cloud_network_ID> \
      --service-account-id <service_account_ID_for_cluster> \
      --node-service-account-id <serivce_account_ID_for_node_group> \
      --cluster-ipv4-range 10.96.0.0/16 \
      --service-ipv4-range 10.112.0.0/16 \
      --public-ip \
      --master-location zone=ru-central1-a,subnet-id=<cloud_subnet_ID_in_ru-central1-a_zone> \
      --master-location zone=ru-central1-b,subnet-id=<cloud_subnet_ID_in_ru-central1-b_zone> \
      --master-location zone=ru-central1-d,subnet-id=<cloud_subnet_ID_in_ru-central1-d_zone> \
      --security-group-ids <k8s-cluster-nodegroup-traffic_ID>,<k8s-cluster-traffic_ID>
    

    You can get the security group ID together with information about the security group.

  7. Create a node group and associate it with the k8s-cluster-nodegroup-traffic, k8s-nodegroup-traffic, k8s-services-access, and k8s-ssh-access security groups:

    yc managed-kubernetes node-group create \
      --name worker-nodes-a \
      --cluster-id <cluster_ID> \
      --location zone=ru-central1-a \
      --fixed-size 1 \
      --network-interface subnets=<subnet_ID_in_ru-central1-a>,ipv4-address=nat,security-group-ids=[<k8s-cluster-nodegroup-traffic_ID>,<k8s-nodegroup-traffic_ID>,<k8s-services-access_ID>,<k8s-ssh-access_ID>]
    

    You can get the security group ID together with information about the security group.

  1. Create security groups with the required rules:

    resource "yandex_vpc_security_group" "k8s-cluster-nodegroup-traffic" {
      name        = "k8s-cluster-nodegroup-traffic"
      description = "The group rules allow service traffic for the cluster and node groups. Apply them to the cluster and node groups."
      network_id  = "<cloud_network_ID>"
      ingress {
        description       = "Rule for health checks of the network load balancer."
        from_port         = 0
        to_port           = 65535
        protocol          = "TCP"
        predefined_target = "loadbalancer_healthchecks"
      }
      ingress {
        description       = "Rule for incoming service traffic between the master and nodes."
        from_port         = 0
        to_port           = 65535
        protocol          = "ANY"
        predefined_target = "self_security_group"
      }
      ingress {
        description    = "Rule for health checks of nodes using ICMP messages from subnets within Yandex Cloud."
        protocol       = "ICMP"
        v4_cidr_blocks = ["10.0.0.0/8", "172.16.0.0/12", "192.168.0.0/16"]
      }
      egress {
        description       = "Rule for outgoing service traffic between the master and nodes."
        from_port         = 0
        to_port           = 65535
        protocol          = "ANY"
        predefined_target = "self_security_group"
      }
    }
    
    resource "yandex_vpc_security_group" "k8s-nodegroup-traffic" {
      name        = "k8s-nodegroup-traffic"
      description = "The group rules allow service traffic for node groups. Apply it to the node groups."
      network_id  = "<cloud_network_ID>"
      ingress {
        description    = "Rule for incoming traffic that allows traffic transfer between pods and services."
        from_port      = 0
        to_port        = 65535
        protocol       = "ANY"
        v4_cidr_blocks = ["10.96.0.0/16", "10.112.0.0/16"]
      }
      egress {
        description    = "Rule for outgoing traffic that allows node group nodes to connect to external resources."
        from_port      = 0
        to_port        = 65535
        protocol       = "ANY"
        v4_cidr_blocks = ["0.0.0.0/0"]
      }
    }
    
    resource "yandex_vpc_security_group" "k8s-services-access" {
      name        = "k8s-services-access"
      description = "The group rules allow connections to services from the internet. Apply it to the node groups."
      network_id  = "<cloud_network_ID>"
      ingress {
        description    = "Rule for incoming traffic that allows connections to services."
        from_port      = 30000
        to_port        = 32767
        protocol       = "TCP"
        v4_cidr_blocks = ["0.0.0.0/0"]
      }
    }
    
    resource "yandex_vpc_security_group" "k8s-ssh-access" {
      name        = "k8s-ssh-access"
      description = "The group rules allow connections to nodes over SSH. Apply it to the node groups."
      network_id  = "<cloud_network_ID>"
      ingress {
        description    = "Rule for incoming traffic that allows connections to nodes over SSH."
        port           = 22
        protocol       = "TCP"
        v4_cidr_blocks = ["85.32.32.22/32"]
      }
    }
    
    resource "yandex_vpc_security_group" "k8s-cluster-traffic" {
      name        = "k8s-cluster-traffic"
      description = "The group rules allow traffic for the cluster. Apply it to the cluster."
      network_id  = "<cloud_network_ID>"
      ingress {
        description    = "Rule for incoming traffic that allows access to the Kubernetes API (port 443)."
        port           = 443
        protocol       = "TCP"
        v4_cidr_blocks = ["203.0.113.0/24"]
      }
      ingress {
        description    = "Rule for incoming traffic that allows access to the Kubernetes API (port 6443)."
        port           = 6443
        protocol       = "TCP"
        v4_cidr_blocks = ["203.0.113.0/24"]
      }
      egress {
        description    = "Rule for outgoing traffic that allows traffic transfer between the master and metric-server pods."
        port           = 4443
        protocol       = "TCP"
        v4_cidr_blocks = ["10.96.0.0/16"]
      }
      egress {
        description    = "Rule for outgoing traffic to allow master host connection to NTP servers for time syncing."
        port           = 123
        protocol       = "UDP"
        v4_cidr_blocks = ["0.0.0.0/0"]
      }
    }
    
  2. Create a cluster with a node group and apply the security groups with rules as follows:

    resource "yandex_kubernetes_cluster" "k8s-cluster" {
      name = "k8s-cluster"
      service_account_id = "<service_account_ID_for_cluster>"
      node_service_account_id = "<service_account_ID_for_node_groups>"
      cluster_ipv4_range = "10.96.0.0/16"
      service_ipv4_range = "10.112.0.0/16"
      network_id = "<cloud_network_ID>"
      master {
        master_location {
          zone      = "ru-central1-a"
          subnet_id = "<cloud_subnet_ID_in_zone>"
        }
        master_location {
          zone      = "ru-central1-b"
          subnet_id = "<cloud_subnet_ID_in_zone>"
        }
        master_location {
          zone      = "ru-central1-d"
          subnet_id = "<cloud_subnet_ID_in_zone>"
        }
        security_group_ids = [
          yandex_vpc_security_group.k8s-cluster-nodegroup-traffic.id,
          yandex_vpc_security_group.k8s-cluster-traffic.id
        ]
        public_ip = true
      }
    }
    
    resource "yandex_kubernetes_node_group" "worker-nodes-a" {
      cluster_id = yandex_kubernetes_cluster.k8s-cluster.id
      name       = "worker-nodes-a"
      allocation_policy {
        location {
          zone = "ru-central1-a"
        }
      }
      scale_policy {
        fixed_scale {
          size = 1
        }
      }
      instance_template {
        network_interface {
          nat                = true
          subnet_ids         = [<cloud_subnet_ID>]
          security_group_ids = [
            yandex_vpc_security_group.k8s-cluster-nodegroup-traffic.id,
            yandex_vpc_security_group.k8s-nodegroup-traffic.id,
            yandex_vpc_security_group.k8s-services-access.id,
            yandex_vpc_security_group.k8s-ssh-access.id
          ]
        }
      }
    }
    

Security groups for an L7 Application Load Balancer and Managed Service for Kubernetes clusterSecurity groups for an L7 Application Load Balancer and Managed Service for Kubernetes cluster

Let's assume you need to create rules for the following conditions:

  • You need to deploy a load balancer with a public IP address accepting HTTPS traffic in three subnets. These subnets' CIDR blocks are 10.128.0.0/24, 10.129.0.0/24, and 10.130.0.0/24.
  • The cluster CIDR block is 10.96.0.0/16 and the service CIDR block is 10.112.0.0/16. These were specified when creating the cluster.
  • The cluster's node group resides in the subnet with the 10.140.0.0/24 CIDR block.
  • SSH connections to nodes and cluster management via the API, kubectl and other utilities are restricted to 203.0.113.0/24.
Terraform

Create the following security groups and rules:

locals {
  network-id = "<cloud_network_ID>"
}

resource "yandex_vpc_security_group" "alb" {
  description = "Load balancer security group"
  name        = "alb"
  network_id  = local.network-id
  ingress {
    description    = "Rule to allow incoming HTTP traffic"
    port           = 80
    protocol       = "TCP"
    v4_cidr_blocks = ["0.0.0.0/0"]
  }
  ingress {
    description    = "Rule to allow incoming HTTPS traffic"
    port           = 443
    protocol       = "TCP"
    v4_cidr_blocks = ["0.0.0.0/0"]
  }
  ingress {
    description       = "Rule for load balancer node health checks"
    port              = 30080
    protocol          = "TCP"
    predefined_target = "loadbalancer_healthchecks"
  }
  egress {
    description    = "Rule for sending traffic to nodes, including health checks"
    from_port      = 0
    to_port        = 65535
    protocol       = "TCP"
    v4_cidr_blocks = ["10.140.0.0/24"]
  }
}

resource "yandex_vpc_security_group" "nodegroup-backend" {
  description = "Node group's security group for backend health checks"
  name        = "nodegroup-backend"
  network_id  = local.network-id
  ingress {
    description    = "Backend health check rule"
    port           = 10501
    protocol       = "TCP"
    v4_cidr_blocks = ["10.128.0.0/24", "10.129.0.0/24", "10.130.0.0/24"]
  }
}

resource "yandex_vpc_security_group" "k8s-cluster-nodegroup-traffic" {
  description = "Cluster and node group's security group for service traffic"
  name        = "k8s-cluster-nodegroup-traffic"
  network_id  = local.network-id
  ingress {
    description       = "Network load balancer rule"
    from_port         = 0
    to_port           = 65535
    protocol          = "TCP"
    predefined_target = "loadbalancer_healthchecks"
  }
  ingress {
    description       = "Rule for traffic between the master and nodes"
    from_port         = 0
    to_port           = 65535
    protocol          = "ANY"
    predefined_target = "self_security_group"
  }
  ingress {
    description    = "Rule for health checks of nodes from subnets within Yandex Cloud"
    from_port      = 0
    to_port        = 65535
    protocol       = "IPV6_ICMP"
    v4_cidr_blocks = ["10.0.0.0/8", "192.168.0.0/16", "172.16.0.0/12"]
  }
  egress {
    description       = "Rule for traffic between the master and nodes"
    from_port         = 0
    to_port           = 65535
    protocol          = "ANY"
    predefined_target = "self_security_group"
  }
}

resource "yandex_vpc_security_group" "nodegroup-traffic" {
  description = "Node group's security group for service traffic"
  name        = "nodegroup-traffic"
  network_id  = local.network-id
  ingress {
    description    = "Rule for traffic between pods and services"
    from_port      = 0
    to_port        = 65535
    protocol       = "ANY"
    v4_cidr_blocks = ["10.96.0.0/16", "10.112.0.0/16"]
  }
  egress {
    description    = "Rule for external resource access"
    from_port      = 0
    to_port        = 65535
    protocol       = "ANY"
    v4_cidr_blocks = ["0.0.0.0/0"]
  }
}

resource "yandex_vpc_security_group" "k8s-cluster-traffic" {
  description = "Cluster security group for control plane traffic"
  name        = "k8s-cluster-traffic"
  network_id  = local.network-id
  ingress {
    description    = "Rule for access to the Kubernetes API"
    port           = 443
    protocol       = "TCP"
    v4_cidr_blocks = ["203.0.113.0/24"]
  }
  ingress {
    description    = "Rule for access to the Kubernetes API"
    port           = 6443
    protocol       = "TCP"
    v4_cidr_blocks = ["203.0.113.0/24"]
  }
  egress {
    description    = "Rule for traffic between the master and metric-server pods"
    port           = 4443
    protocol       = "TCP"
    v4_cidr_blocks = ["10.96.0.0/16"]
  }
}

resource "yandex_vpc_security_group" "nodegroup-services-access" {
  description = "Node group's security group for accessing services from the internet"
  name        = "nodegroup-services-access"
  network_id  = local.network-id
  ingress {
    description    = "Rules for accessing services from the internet and Yandex Cloud subnets"
    from_port      = 30000
    to_port        = 32767
    protocol       = "TCP"
    v4_cidr_blocks = ["0.0.0.0/0"]
  }
}

resource "yandex_vpc_security_group" "nodegroup-ssh" {
  description = "Node group's security group for SSH access to nodes"
  name        = "nodegroup-ssh"
  network_id  = local.network-id
  ingress {
    description    = "Rules for SSH access to nodes"
    port           = 22
    protocol       = "TCP"
    v4_cidr_blocks = ["203.0.113.0/24"]
  }
}

Was the article helpful?

Previous
Connection method overview
Next
Creating a static configuration file
© 2026 Direct Cursus Technology L.L.C.