All Hitachi Kubernetes Service Engine clusters are provisioned with open firewall rules on their respective cloud providers. If you would like to go into your cloud provider and close off traffic from the cluster, you must allow ingress and egress to and from our API servers in order for our coordinator to sync registries, upgrades, plugins, registries, and ssh keys as well as for our proxy service to facilities calls from the cloud dashboard and kubectl.
The follow are the IPs of our API servers:
Your pods are not exposed to the internet unless you put a NodePort or LoadBalancer service on them. Be aware of creating these and ensure your application can handle the internet traffic appropriately.
Internal cluster communication is exposed through any service type. You can determine what pods can communicate with your workloads and vice-versa using Kubernetes Network Policies.
All requests to the Kubernetes service coordinator and Kubernetes API are authenticated through our proxy, and all communication is done over TLS. All etcd communication is strictly done locally on the cluster using strong credentials and mutual certificate auth with the API server. You can read more about securing Kubernetes clusters here.