Skip to content

Network Isolation

Kupe Cloud enforces network-level isolation on all managed clusters. Your workloads can reach the internet but cannot access platform infrastructure or other tenants’ clusters.

DestinationAllowedNotes
Public internetYesAny external IP or hostname
DNSYesCluster DNS resolves normally
Same-cluster podsYesPod-to-pod within your cluster works
Other tenants’ clustersNoBlocked by network policy
Platform servicesNoBlocked (monitoring, auth, secrets)
Cluster nodesNoBlocked (kubelet, etcd, API server)

Managed clusters apply network policies that:

  1. Allow DNS — your pods can resolve hostnames normally
  2. Allow same-cluster traffic — pods within your cluster communicate freely
  3. Allow internet egress — outbound to any public IP
  4. Block internal ranges — RFC 1918 private ranges (10.x, 172.16.x, 192.168.x) are blocked

This ensures your workloads operate normally while preventing access to infrastructure that belongs to the platform or other tenants.

Your cluster’s Kubernetes API is accessible via a public endpoint:

https://<cluster>.<tenant>.kupe.cloud

This endpoint uses TLS passthrough with OIDC authentication — the same security model used by managed Kubernetes providers like EKS, GKE, and ASK. No VPN required.

Inbound traffic to your workloads flows through the shared Gateway API infrastructure. Create HTTPRoutes to expose your services — the platform handles TLS termination and routing.

Your pods receive traffic from the gateway proxy only. Direct inbound connections from the internet to pod IPs are not possible.