Skip to content

reporting issue with policy - Limit Control Plane endpoint access #227

@rahulracker7539

Description

@rahulracker7539

Community Note

  • Please vote on this issue by adding a 👍 reaction
    to the original issue to help the community and maintainers prioritize this request
  • Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do
    not help prioritize the request
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment.

Description

In our GKE control plane networking configuration, we have disabled the public endpoint and are using only the private endpoint. We have also disabled control plane access both through the internal endpoint and through the Google Cloud external IP address.
However, when I run a cluster check, it still shows the status as invalid instead of valid :-

#3 CRITICAL Limit Control Plane endpoint access (documentation)

  • projects//locations/europe-west2/clusters/standard-gke-cluster [INVALID]
    · Cluster is not configured with master authorized networks CIDRs

References

  • #0000

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions