This repository has been archived by the owner on Oct 22, 2021. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 63
Remove security group that allows apps to communicate with internal network #304
Labels
Milestone
Comments
mook-as
added a commit
to mook-as/kubecf
that referenced
this issue
Jan 14, 2020
This adds a //dev/minikube:load bazel rule that, when run, will build a golang-based program (which does nothing useful as of now) and loads it into the minikube VM. This is in preparation for adding a job to set up application security groups in the cloud controller to allow applications to access credhub (but only credhub) in support of cloudfoundry-incubator#304.
mook-as
added a commit
that referenced
this issue
Jan 23, 2020
This adds a //dev/minikube:load bazel rule that, when run, will build a golang-based program (which does nothing useful as of now) and loads it into the minikube VM. This is in preparation for adding a job to set up application security groups in the cloud controller to allow applications to access credhub (but only credhub) in support of #304.
mook-as
added a commit
to mook-as/kubecf
that referenced
this issue
Jan 29, 2020
This adds a //dev/minikube:load bazel rule that, when run, will build a golang-based program (which does nothing useful as of now) and loads it into the minikube VM. This is in preparation for adding a job to set up application security groups in the cloud controller to allow applications to access credhub (but only credhub) in support of cloudfoundry-incubator#304.
7 tasks
fargozhu
added
the
Status: Blocked
Dependencies on other issues and/or pull requests
label
Jan 31, 2020
fargozhu
removed
the
Status: Blocked
Dependencies on other issues and/or pull requests
label
Feb 3, 2020
fargozhu
added
SUSE
SUSE is pursuing a solution
Status: Accepted
This issue will be implemented in a near future
labels
Feb 4, 2020
fargozhu
added
Status: WIP
and removed
Status: Accepted
This issue will be implemented in a near future
labels
Feb 4, 2020
fargozhu
added
the
Status: Verification Needed
Issue must be verified before closed
label
Mar 2, 2020
7 tasks
fargozhu
removed
Status: Verification Needed
Issue must be verified before closed
Status: WIP
labels
Mar 6, 2020
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Labels
Describe the bug
Replaces #297.
The pod and service CIDRs are currently required to created an app security group that allows connections to the internal k8s network. It allows connection to service brokers like
credhub
.To Reproduce
Always.
Expected behavior
This approach is erroneous and we should allow only the
credhub
IP.An auto-errand can take care of it by resolving
credhub.service.cf.internal
and creating a security group allowing apps to communicate with this IP. We also should addfeatures.credhub.enabled=true
as default, but removecredhub
and the auto-errand when this setting isfalse
, allowing the usage of an externalcredhub
instance.Environment
Kubecf 0.1, all platforms.
The text was updated successfully, but these errors were encountered: