An AKS Cluster's Kubelet should only allow explicitly authorized requests

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Description

Kubelets can be configured to allow all authenticated requests (even anonymous ones) without needing explicit authorization checks from the apiserver. You should restrict this behavior and only allow explicitly authorized requests.

Remediation

Choose one of the following remediation methods. For both methods, a restart of the Kubelet service is required.

Kubelet config file

  1. Add the following JSON to the /etc/kubernetes/kubelet/kubelet-config.json file.
"authentication": { "webhook": { "enabled": true } }
"authorization": { "mode": "Webhook" }

Executable arguments

  1. Edit the kubelet service file on each worker node and ensure the following parameters are part of the KUBELET_ARGS variable string.
--authentication-token-webhook
--authorization-mode=Webhook
PREVIEWING: brett.blue/embedded-collector-release