-
Notifications
You must be signed in to change notification settings - Fork 269
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(blog): May 2024 update #4936
Conversation
The latest updates on your projects. Learn more about Vercel for Git ↗︎ 1 Ignored Deployment
|
Terraform Cloud Plan Output
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A copy-pasted version of this article was accidentally merged in #4916
Performance Test ResultsTCP
UDP
|
This is useful, for example, to allow access to some services running on a host | ||
(like SSH) to your DevOps team for maintenance purposes, while only allowing | ||
HTTP and HTTPS traffic to the host for the rest of your organization. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't think I'm following here. We don't associate ports/protocols with policies right? How are we able to prevent a group from accessing a specific port (from the ports opened up using the filters on the resource) once there is a policy that gives that group access to the resource?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah let me reword it. You would create two Resources.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this can still go out given the solution to our problem noted in #4939. Anyone that manages to hit this issue will be resolved in that issue.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sounds good 👍
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I left one question about whether we should include/remove the example on traffic filtering, but other than that everything looks good.
fixes #4817