Locking Down Your Kubernetes Cluster With Linkerd
Locking Down Your Kubernetes Cluster With Linkerd
Servers
kind: ServerAuthorization
metadata:
★ Describes the types of traffic namespace: emojivoto
that are allowed to those name: admin-unauthed
Servers spec:
server:
Example: unauthenticated traffic name: admin
to the "admin" Server is allowed client:
unauthenticated: true
ServerAuthz's can match multiple Servers!
Example: traffic to any Server with
apiVersion: policy.linkerd.io/v1beta1
kind: ServerAuthorization
★ Otherwise
○ Denial is a refused TCP connection
★ The default policy for a pod is fixed at startup time, based on the
annotations then present in the namespace and workload.
★ ... with one edge case, which is that you can dynamically change the
cluster-wide default with linkerd update. Only works if no annotations
are overriding it.
The Server and ServerAuthorization CRs are, of course, read dynamically.
Gotcha #3: Ports must be in the pod spec!
If a Server references a port that is not in the pod spec, it will be ignored.
Hands-on time!
Let's take a look at how to get our Emojivoto app into a high security,
"deny by default" namespace.
Register today!
buoyant.io/register/end-to-end-encryption-with-emissary-and-linkerd
@BuoyantIO buoyant.io
The best way to run
in mission-critical
environments
★ Automatically track data plane and control plane health
★ Manage mesh certificates and versions
Request a demo
★ Build the ultimate service mesh platform buoyant.io/demo
★ Get full Linkerd support