11pack :
22 k8sHardening : True
3+ content :
4+ images :
5+ - image : registry.k8s.io/coredns/coredns:v1.11.3
6+ - image : registry.k8s.io/etcd:3.5.15-0
7+ - image : registry.k8s.io/kube-apiserver:v1.30.6
8+ - image : registry.k8s.io/kube-controller-manager:v1.30.6
9+ - image : registry.k8s.io/kube-proxy:v1.30.6
10+ - image : registry.k8s.io/kube-scheduler:v1.30.6
11+ - image : registry.k8s.io/pause:3.9
12+ - image : registry.k8s.io/pause:3.8
313 # CIDR Range for Pods in cluster
414 # Note : This must not overlap with any of the host or service network
515 podCIDR : " 100.64.0.0/18"
1020 config :
1121 dashboard :
1222 identityProvider : palette
13- # serviceDomain: "cluster.local"
14-
15- # KubeAdm customization for kubernetes hardening. Below config will be ignored if k8sHardening property above is disabled
1623kubeadmconfig :
1724 apiServer :
1825 extraArgs :
@@ -31,6 +38,7 @@ kubeadmconfig:
3138 audit-log-maxbackup : " 10"
3239 audit-log-maxsize : " 100"
3340 authorization-mode : RBAC,Node
41+ kubelet-certificate-authority : " /etc/kubernetes/pki/ca.crt"
3442 tls-cipher-suites : " TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_128_GCM_SHA256"
3543 extraVolumes :
3644 - name : audit-log
@@ -85,31 +93,33 @@ kubeadmconfig:
8593 kind: PodSecurityConfiguration
8694 defaults:
8795 enforce: "baseline"
88- enforce-version: "v1.28 "
96+ enforce-version: "v1.30 "
8997 audit: "baseline"
90- audit-version: "v1.28 "
98+ audit-version: "v1.30 "
9199 warn: "restricted"
92- warn-version: "v1.28 "
100+ warn-version: "v1.30 "
93101 audit: "restricted"
94- audit-version: "v1.28 "
102+ audit-version: "v1.30 "
95103 exemptions:
96104 # Array of authenticated usernames to exempt.
97105 usernames: []
98106 # Array of runtime class names to exempt.
99107 runtimeClasses: []
100108 # Array of namespaces to exempt.
101- namespaces: [kube-system,monitoring,rook-ceph ]
109+ namespaces: [kube-system]
102110
103111 preKubeadmCommands :
104112 # For enabling 'protect-kernel-defaults' flag to kubelet, kernel parameters changes are required
105113 - ' echo "====> Applying kernel parameters for Kubelet"'
106114 - ' sysctl -p /etc/sysctl.d/90-kubelet.conf'
107- # postKubeadmCommands:
108- # - 'echo "List of post kubeadm commands to be executed"'
115+
116+ postKubeadmCommands :
117+ - ' chmod 600 /var/lib/kubelet/config.yaml'
118+ # - 'echo "List of post kubeadm commands to be executed"'
109119
110- # Client configuration to add OIDC based authentication flags in kubeconfig
111- # clientConfig:
112- # oidc-issuer-url: "{{ .spectro.pack.kubernetes.kubeadmconfig.apiServer.extraArgs.oidc-issuer-url }}"
113- # oidc-client-id: "{{ .spectro.pack.kubernetes.kubeadmconfig.apiServer.extraArgs.oidc-client-id }}"
114- # oidc-client-secret: 1gsranjjmdgahm10j8r6m47ejokm9kafvcbhi3d48jlc3rfpprhv
115- # oidc-extra-scope: profile,email
120+ # Client configuration to add OIDC based authentication flags in kubeconfig
121+ # clientConfig:
122+ # oidc-issuer-url: "{{ .spectro.pack.kubernetes.kubeadmconfig.apiServer.extraArgs.oidc-issuer-url }}"
123+ # oidc-client-id: "{{ .spectro.pack.kubernetes.kubeadmconfig.apiServer.extraArgs.oidc-client-id }}"
124+ # oidc-client-secret: 1gsranjjmdgahm10j8r6m47ejokm9kafvcbhi3d48jlc3rfpprhv
125+ # oidc-extra-scope: profile,email
0 commit comments