DigitalOcean home
  • Droplets
  • Spaces
  • Kubernetes
  • Tools & Integrations
  • One-click Apps
  • API Documentation
  • Community
  • Tutorials
  • Q&A
  • Projects
  • Meetups
  • Customers
  • Pricing
  • Docs
  • Support
  • DigitalOcean home
  • Products
    • Droplets

      Scalable compute services.

    • Spaces

      Simple object storage.

    • Kubernetes

      Run managed Kubernetes clusters.

    • Tools & Integrations

      Automate your infrastructure.

    • One-click Apps

      Deploy pre-built applications.

    • API Documentation
  • Customers
  • Community
    • Community Overview

      Connect, share and learn

    • Tutorials

      DevOps and development guides

    • Questions & Answers

      Development and systems Q&A

    • Projects

      Community-built integrations

    Get Involved
    Write for DOnations
    Join us at a Meetup
    Featured Post
    An Introduction to Kubernetes

    by Justin Ellingwood

  • Pricing
  • Docs
  • Support
    • Documentation

    • Contact Support

    • Network Status

  • Home /
  • NETSECX-I-15 /
  • New idea
6 Vote

Close the security concern of mandated public internet availability of the Kubernetes NodePorts

Most people use a VPC network when creating a Kubernetes cluster and places a Load Balancer in front of it and then using an Ingress controller in the cluster to send traffic to the cluster. This Ingress controller usually is opening one (or more) NodePorts on the cluster nodes in the 30000-32767 port range. This is where the load balancer is sending the incoming traffic to.

The problem is that DigitalOcean does AUTOMATICALLY creates a firewall for the Kubernetes cluster nodes where the 30000-32767 port range is open to the public internet. While you can manually modify this firewall (so those ports are only open to the VPC and NOT to the public internet), your change will get overwritten the next time when there is a change to the cluster and that firewall gets reconciled.

You can also create another (supplementary) firewall, but as the firewall rules combine their permissive rules, you cannot close those ports to the public internet by another firewall, only open up new ones.

In summary: ALL Kubernetes clusters on DigitalOcean has all their NodePorts open to the public internet and there is no way to permanently close them!!!!

Possible solutions:

- allow firewall rules to close ports (eg REJECT)

- only open the NodePorts to the VPC on that auto-created firewall if the Kubernetes cluster was created in a VPC and not to the public internet

See others complaining about the same in Macil's comment at https://www.digitalocean.com/community/questions/how-to-customize-firewall-rules-for-managed-kubernetes-service

  • Anonymous
  • Sep 26 2020
  • Needs review
Network Security
  • Comments (0)
  • Votes (6)
  • Attach files
Log in / Sign up

Identify yourself with your email address

Subscribe

You won't be notified about changes to this idea.

Related ideas

DigitalOcean home

© 2018 DigitalOcean, LLC. All rights reserved.
Proudly made in NY

  • Twitter
  • Facebook
  • Instagram
  • YouTube
  • LinkedIn
  • Glassdoor
Company
About
Leadership
Blog
Careers
Partner Network
Referral Program
Events
Press
Legal & Security
Products
Droplets
Spaces
Kubernetes
Tools & Integrations
One-click Apps
API
Pricing
Documentation
Release Notes
Community
Tutorials
Meetups
Q&A
Write for DOnations
Droplets for Demos
Hatch
Shop Swag
Research Program
Currents Research
Open Source
Support
Contact Support
FAQ
Network Status