Skip to content

Access Profiles

Manager | Partner

Access Profiles allow you to securely configure connectivity and policies for your Kubernetes clusters and Bastion servers.

The Access Profiles table can be extended to display the last modification details, including "Last Modified" and "Last Modified By."

Note

When using SSH to connect to the servers, do not use the user "ubuntu"; it is reserved for Taikun’s cluster management.


Adding an Access Profile

Create a new Access Profile to access a specific project by clicking the "Add Alerting Profile" button.

Add Access Profile

Add Access Profiles

Specify the following parameters:

  • Name: Choose a name for the new profile (3-30 characters).
  • HTTP Proxy: Set a proxy server to create a gateway between the cluster and the Internet, allowing access to external packages, Docker images, etc. This ensures security by preserving your own IP.

Additional Configuration Options

SSH Users

Allow a user to access the Kubernetes API by adding a Public Key (supported key types: RSA, ECDSA, Ed25519).

Note

If your Public Key contains special characters (such as : or +), Taikun will fail to create the servers in Proxmox.

DNS

Resolves alphabetic names to IP addresses. You can specify a DNS for your server.

Note

DNS settings will be ignored if you choose to import network configurations when establishing Cloud Credentials.

NTP Server

Synchronizes local time clocks with a selected time server, ensuring all clusters operate in the same time zone.

Allowed Hosts

Define an IP address or range to restrict access to your Kubernetes environment.

Note

If you need to update any of these parameters, you can use the Show button to modify the necessary fields.


Trusted Container Registries

Users with sufficient privileges (such as Partner Managers) can define and manage Trusted Container Registries within an Access Profile. This feature allows organizations to control which container registries are approved for use during Kubernetes cluster creation.

The Trusted Registries section is available when creating or editing an Access Profile.

Key Details and Format

  • Users can add or remove up to a maximum of 100 registry entries per Access Profile.
  • Each entry is automatically validated to ensure it follows the correct format.
  • Valid entries can include domain names or IP addresses, with an optional port (e.g., secure.repo.net, 10.25.34.8:5000, images.corpcloud.io:9443).
  • Entries must not include a protocol prefix (such as http:// or https://).

Impact of Changes

  • When adding new registries, users will see a warning that the Access Profile has changed and that associated clusters may need updates.

  • Crucially, changes affect only clusters created after the update. Existing clusters will not automatically receive any added, edited, or removed registries.

Verifying Trusted Registries on a Cluster

Users can check the configured trusted registries on a cluster by looking at the master node in the file: /etc/containerd/config.toml


Actions

Edit HTTP Proxy

Update the access profile.

Delete Access Profile

Delete an Access Profile, but the default profile cannot be removed.