Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I'd guess management access, or the old school way of doing vLANs. Kubernetes offers Network Policies to solve the risk of untrusted workloads in the cluster accessing both pods and ports on pods that they shouldn't https://kubernetes.io/docs/concepts/services-networking/netw...

Network Policies are also defense in depth, since another Pod would need to know its sibling Pod's name or IP to reach it directly, the correct boundary for such things is not to expose management toys in the workload's Service, rather create a separate Service that just exposes those management ports

Akin to:

  interface Awesome { String getFavoriteColor(); }
  interface Management { void setFavoriteColor(String value); }
  class MyPod implements Awesome, Management {}
but then only make either Awesome, or Management, available to the consumers of each behavior


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: