Control external IP address range for nodes in kubernetes cluster on Google Cloud

google-cloud-platformgoogle-kubernetes-enginemongodb

I would like to provide a whitelisted range for connections to a MongoDB Atlas instance running on Google Cloud. VPC Peering isn't yet available on Atlas for Google Cloud – Is it possible to provide a CIDR range for external IP addresses allocated to nodes in a kubernetes cluster?

Alternatively, any tips on ensuring the source of connections are from an authorized node? (Other than SSL + username and password)

Best Answer

There is no direct way to determine which external IPs will be used by VMs (unless you have already reserved IPs) or clusters. Nevertheless there are some workarounds you could consider.

One of them is making outgoing connections from the POD via a proxy. The proxy could be an another Pod or a dedicated VM. Some other approaches are described on this discussion