To ensure proper isolation of control plane components in Seed clusters, as of KKP version 2.18, KKP uses NetworkPolicies to constraint the egress traffic of the Kubernetes API Server.
The egress traffic of the API Server pods is restricted to the following set of control plane pods of the same user cluster:
The NetworkPolicies are automatically applied to all newly created clusters. For previously existing clusters, the feature can be activated by adding the feature gate apiserverNetworkPolicy
to the Cluster resource / API object (Cluster spec.features
).
To ensure that NetworkPolicies are actually in place, make sure that the CNI plugin used for the Seed cluster supports the NetworkPolicies.
Under certain situations (e.g. for debugging purposes), it may be necessary to disable API Server Network Policies. This can be done either for an existing user cluster, or globally on seed cluster level.
In an already existing user cluster, the API Server Network Policies can be disabled manually using these steps:
apiserverNetworkPolicy
in the Cluster resource / API object (Cluster spec.features
),kubectl get networkpolicy -n cluster-<cluster-id>
).The API Server Network Policies can be disabled for all newly created user clusters on the Seed cluster level using the Defaulting Cluster Template feature.
In the defaulting cluster template, set the apiserverNetworkPolicy
feature gate to false
, e.g.:
spec:
features:
apiserverNetworkPolicy: false
Please note that this procedure does not affect already running user clusters, for those the API Server Network Policies need to be disabled individually as described in the previous section.