diff --git a/content/faq/how-to-ssh-kops-cluster.md b/content/faq/how-to-ssh-kops-cluster.md new file mode 100644 index 000000000..44dedf0ae --- /dev/null +++ b/content/faq/how-to-ssh-kops-cluster.md @@ -0,0 +1,28 @@ +--- +title: "How do we SSH into a `kops` Kubernetes cluster? " +description: "There's the way it works out of the box and then there's the fancy way, which is recommended." +tags: +- kops +- SSH +- Kubernetes +- Gravitational Teleport +--- + +## Question + +How do we SSH into nodes and pods in a `kops` Kubernetes cluster? + +## Answer + +There's the way it works out of the box and then there's the fancy way, which is recommended. + +Out of the box, there's a set of master keys that are required when provisioning the `kops` cluster. These can be used as a last resort to access the nodes. The downside is that these keys must be shared, and rotating them is painful and time-consuming, requiring a rolling update of all nodes in the cluster. In [`geodesic`](https://github.com/cloudposse/geodesic), we've added a shortcut to make this easier by running `kopsctl cluster ssh bastion`. + +The fancier way (aka the “recommended way”) is with Gravitational Teleport. It provides an enterprise-grade SSH PKI with Single Signon, session logs, pretty YouTube-style session replays, bastions (proxies), and event hooks. This is what our customers who are serious about security and compliance use. Everything needed to deploy Teleport is public on our GitHub. + +To get started, you'll need: + 1. [Helmfiles](https://github.com/cloudposse/helmfiles/tree/master/releases) + 2. [Blueprints](https://github.com/cloudposse/terraform-root-modules/tree/master/aws) for teleport backing services + 3. [`terraform-aws-teleport-storage`](https://github.com/cloudposse/terraform-aws-teleport-storage) module for deploying backing services + +In our experience, you basically never need to access the raw Kubernetes nodes. This wasn’t the case back in the day (when we ran our own homespun solutions on CoreOS). However, with EKS and `kops` things are much more turnkey, and the need for SSH is nearly eliminated.