dedicated-server-image dedicated-server-image
tngnet

Private Cluster Nodes & Endpoint

img

Cloud NAT

If restricting outgoing internet access is not a concern for your organization, use Google's Cloud NAT service to allow nodes in the private network to access the internet, enabling them to download the required images from Dockerhub and contact the Rancher management server.

img

Private registry

If restricting both incoming and outgoing traffic to nodes is a requirement, follow the air-gapped installation instructions to set up a private container image registry on the VPC where the cluster is going to be, allowing the cluster nodes to access and download the images they need to run the cluster agent.

img

Direct access

If the Rancher server is run on the same VPC as the cluster's control plane, it will have direct access to the control plane's private endpoint. The cluster nodes will need to have access to a private registry to download images as described above.

Private Nodes

Public and private Clusters

img

Public Cluster

Public Cluster offers two different cluster accesses: Public and Private Cluster. A Public cluster doesn’t imply the cluster can be publicly managed. It means the Master and nodes IP are public.

img

TNGNET Cloud Private cluster

On the other hand, a Private cluster doesn’t assign public IP addresses to the nodes. It reduces the attack surface and the risk of compromising the workloads.

img

Networks and firewall rules

A VPC-native Cluster is required to configure our desired network components.

img

Defining private IP ranges

We first need to define private IP ranges for the nodes, services and pods. To do so, we define a subnetwork in our VPC network. A subnet in Google Cloud has a primary IP range, and optional secondary ranges (IP alias ranges).

img

Google Health Check

It is recommended to enable GooglePrivate Access, so Google services are reachable without going over the public internet.

img

Private Cluster endpoint

In the setup we define for this article, we choose to use a third option. We wrote Terraform code to create the private clusters with a public endpoint for the Master node.

img
tngnet

Interested in a TNGNET Private Cluster Server?

  • For our use case, we'd like to set up a network with a private IP range (say, 10.128.0.0/16), and then set up a self-contained cluster within that network.

  • That would imply that every node in the cluster would have an IP address in that range, as would every load balancer, and that the Kubernetes API would ideally only be exposed in that network. This is known as a private topology.

  • As a result, if we establish a VPN connection to that network and configure the appropriate network routes.

Contact Us

Feel free to contact us

We are ready to give you the best support from us

img
img
img
img
Sales & inquiries department
Valued customers & new inquiries
Sales & inquiries department
Support department
Suppliers, vendors & partners
Operations department
Finance department
Public
Info & general department
Abuse department