We are looking to use Rancher primarily for centralized access management in a multi-cloud scenario with imported clusters.
In the architecture overview it says that the cattle-cluster-agent opens a connection/tunnel to the Rancher cluster controller. This is a concern for our security team as they usually only allow outbound connection from our DMZ unless inbound connections are absolutely needed, so they’ve asked me to clarify:
- Is there any way to use imported clusters without requiring inbound connections to the cluster controller?
- Has this tunnel been specifically pentested and/or assessed from a security perspective?
- What was the reasoning behind the decision to establish the connection/tunnel from the cattle-cluster-agent to the cluster controller and not the other way around?