Bobcares

wesupport

CLIENT AREACall Us 1-800-383-5193
Bobcares

wesupport

Call Us 1-800-383-5193
Bobcares

wesupport

Call Us 1-800-383-5193

Need help?

Our experts have had an average response time of 13.52 minutes in October 2021 to fix urgent issues.

We will keep your servers stable, secure, and fast at all times for one fixed price.

Lock down API access to specific IP addresses in EKS cluster

by | Sep 3, 2021

Recently, we had a customer who wants to lock down API access to specific IP addresses in his Amazon EKS cluster.

Here, at Bobcares, we assist our customers with several AWS queries as part of our AWS Support Services.

Today, let us see how we can perform this task.

Lock down API access to specific IP addresses in EKS cluster

Generally, we can lock down access to two types of Amazon EKS API server access endpoints. They are:

  • Public access endpoints

Access to the API server is open to the public by default. You can lock down access to specific CIDR blocks and IP addresses.

  • Private access endpoints

The API server can be accessed only from within an Amazon Virtual Private Cloud (Amazon VPC). You can further lock down access to specific VPC CIDR blocks through cluster security groups.

Moving ahead, let us see the steps our Support Techs employ in order to lock public and private access endpoints.

  • Public access endpoints

  1. Initially, we open the Amazon EKS console.
  2. Then we select the Clusters, and then select the specific cluster.
  3. In the Networking section, we select the option, Update.
  4. After that, we expand Advanced Settings. To do so, we need to enable public access.
  5. Now, we enter a CIDR block that we want to allow access from.
  6. If necessary, to enter additional blocks, we seelct, Add Source.
  7. Finally, we go ahead and click, Update.
  • Private access endpoints

  1. First, we open the Amazon EKS console.
  2. As above, we select Clusters, and then the cluster.
  3. In the Networking section, we note the name of the cluster security group and any additional security groups.
  4. Then we add ingress rules to any one of those security groups.

For the ingress rule, we can set TCP as the protocol, 443 as the port and source IP from which we allow access.

In addition, our Support Techs recommend to keep in mind the following:

  1. If we fail to specify any CIDR blocks, then the public API server endpoint receives requests from all IP addresses.
  2. We have to enable private endpoint access for worker nodes and AWS Fargate pods to communicate with the cluster through the private endpoint.
  3. Without enabling the private endpoint, the public access endpoint CIDR sources must include the egress sources from the Amazon VPC.

[Need help with the lock down? We’d be happy to assist]

Conclusion

In short, we saw how our Support Techs Lock down API access to specific IP addresses in EKS cluster.

PREVENT YOUR SERVER FROM CRASHING!

Never again lose customers to poor server speed! Let us help you.

Our server experts will monitor & maintain your server 24/7 so that it remains lightning fast and secure.

GET STARTED

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Reviews