Limit network access to Kubernetes Cluster

I’d like to limit my Atlas cluster to just my Kubernetes cluster instead of the default 0.0.0.0/0 range.

Should I add access entries for the External IPs of every node in the cluster, or is there something more to it?

There is no default allowlist, someone added this. And it is contrary to good practice.

That is it. Unless you’re doing something fancy with your outbound traffic like nat-ing it to one particular ip.

Thanks. Adding the ExternalIP for all my nodes worked, and removing the 0.0.0.0/0 entry didn’t cause any adverse effects.

This topic was automatically closed 5 days after the last reply. New replies are no longer allowed.