English

Network Security and Access Controls

Contributors ebarcott

We recommend you secure your NetApp Kubernetes Service (NKS) clusters appropriately for your infrastructure and workload security requirements, regardless of where they are deployed.

In the case of NKS operating on-premises (such as NKS on NetApp HCI, and NKS on VMware), network access controls at the corporate firewall level may need take into account any secure channels which are required for communicating between the public-cloud-hosted NKS controller elements and your on-premises resources.

If you decide to restrict access to individual NKS clusters, you will need to whitelist the following ports, hostnames, and IP addresses so that the NetApp Kubernetes Service can operate correctly.

Outbound Traffic

Whitelist outbound traffic on port 443 for HTTPS.

Inbound Traffic

NKS Service IP addresses:

  • 34.208.181.140

  • 34.217.162.31

  • 54.187.65.159

  • 18.236.231.155

  • 52.88.189.147

  • 52.37.216.171

  • 34.223.156.86

For these IP addresses, whitelist inbound traffic on the following ports:

Port

Purpose

443

HTTPS. Applies to securing individual NKS-provisioned Kubernetes cluster(s) in Public Clouds. All traffic flows outbound through 443 for on-premises deployed clusters.

6443

Kubernetes API.

2443

Proxy to dashboard.

22

Kubernetes upgrades and other local tasks.