Skip to content

cleanstart-containers/kube-proxy

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CleanStart Container for Kube-Proxy

Kube-proxy is a network proxy that runs on each node in a Kubernetes cluster, maintaining network rules on nodes and enabling network communication to Pods. It implements the Kubernetes Service concept by maintaining network rules and performing connection forwarding.


Key Features

Kubernetes v1.34.0 network proxy:

  • Kubernetes v1.34.0 network proxy
  • Supports iptables, ipvs, and nftables proxy modes
  • Health and metrics endpoints included
  • Optimized for cloud-native environments
  • Network rule management and connection forwarding

Common Use Cases

Typical scenarios where this container excels:

  • Kubernetes cluster network proxy
  • Service load balancing and routing
  • Network rule management on cluster nodes
  • Pod-to-Pod and Service-to-Pod communication
  • Cluster networking implementation

Getting Started

Pull Commands

Download the container image:

docker pull ghcr.io/cleanstart-containers/kube-proxy:latest-dev

Quick Test

Verify the image works:

docker run --rm ghcr.io/cleanstart-containers/kube-proxy:latest-dev --version

Best Practices

  • Use specific image tags for production (avoid latest-dev)
  • Configure required capabilities: NET_ADMIN and SYS_MODULE
  • Run as DaemonSet in Kubernetes (one pod per node)
  • Monitor health endpoint on port 10256
  • Enable appropriate proxy mode for your environment (iptables/ipvs/nftables)

Resources


Vulnerability Disclaimer

CleanStart offers Docker images that include third-party open-source libraries and packages maintained by independent contributors. While CleanStart maintains these images and applies industry-standard security practices, it cannot guarantee the security or integrity of upstream components beyond its control.

Users acknowledge and agree that open-source software may contain undiscovered vulnerabilities or introduce new risks through updates. CleanStart shall not be liable for security issues originating from third-party libraries, including but not limited to zero-day exploits, supply chain attacks, or contributor-introduced risks.

Security remains a shared responsibility: CleanStart provides updated images and guidance where possible, while users are responsible for evaluating deployments and implementing appropriate controls.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages