Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add option to restrict inbound connectivity to k8s (or all deployments) #306

Open
sebastian-luna-valero opened this issue Jun 9, 2022 · 9 comments
Assignees
Labels
enhancement New feature or request

Comments

@sebastian-luna-valero
Copy link

Hi,

The option to restrict inbound connectivity is available to deploy VMs:

image

However, it's not available when deploying k8s, which is desirable to restrict public access to the admin endpoints.

Would it be possible add this option?

In general it would be good to have this option available across all the templates so the end user can enable an additional security layer to protect the virtual infrastructure.

Best regards,
Sebastian

@micafer
Copy link
Member

micafer commented Jun 10, 2022

Hi @sebastian-luna-valero,

This option is added in the TOSCA document.
I can add it in the templates that you want.

@sebastian-luna-valero
Copy link
Author

Many thanks, @micafer

Please add it to https://appsgrycap.i3m.upv.es:31443/im-dashboard/configure?selected_tosca=kubernetes.yaml first.

I will do a test and then propose a list for the rest of them.

@micafer
Copy link
Member

micafer commented Jun 10, 2022

Hi @sebastian-luna-valero,

Yo have it done in the devel instance:
https://appsgrycap.i3m.upv.es:31443/im-dashboard-dev/configure?selected_tosca=kubernetes.yaml

Could you please test it?

@sebastian-luna-valero
Copy link
Author

Thanks, @micafer

Port 22 is still allowing connections from 0.0.0.0/0

I have the following
cidr-22: produces Error creating infrastructure: Invalid value in property 'outports'.
cidr-22,80: allow the creation of the VM but:

Port 80 is still allowing connections from 0.0.0.0/0

@sebastian-luna-valero
Copy link
Author

sebastian-luna-valero commented Jun 10, 2022

Oh wait,

Restricting inbound connectivity for port 22 with cidr-22 will block the Ansible configuration done by IM?

image

@micafer
Copy link
Member

micafer commented Jun 13, 2022

Thanks, @micafer

Port 22 is still allowing connections from 0.0.0.0/0

Yes it must be opened to allow IM service to configure it.

I have the following cidr-22: produces Error creating infrastructure: Invalid value in property 'outports'. cidr-22,80: allow the creation of the VM but:

Port 80 is still allowing connections from 0.0.0.0/0

I have tried:
8.8.0.0/24-22 and it worked for me.
8.8.0.0/24-443,8.8.0.0/24-80 use this format to open a set of ports with remote cidr.

@micafer micafer self-assigned this Jun 13, 2022
@micafer micafer added the enhancement New feature or request label Jun 13, 2022
@sebastian-luna-valero
Copy link
Author

I see, thanks!

Ok, personally I mostly use these two templates for the time being:

I don't want to give you extra work by adding this feature to more templates unless other people find it useful, so from my point of view, this is the change that I would like to see in the production instance of IM Dashboard.

Regarding SSH, I just had a random idea. Would it be a good idea that IM added its own cidr-22 automatically, in addition to the user's cidr-22?

@micafer
Copy link
Member

micafer commented Jun 13, 2022

Regarding SSH, I just had a random idea. Would it be a good idea that IM added its own cidr-22 automatically, in addition to the user's cidr-22?

Yes but it should be implemented at the level of the IM service. I have to think about it.

@sebastian-luna-valero
Copy link
Author

Thanks, but in my opinion this is an "optional, nice to have" feature so do not include it in the top priority list of things to do.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants