Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Isolate etcd using Network Policies #631

Closed
marwinski opened this issue Jan 7, 2019 · 7 comments
Closed

Isolate etcd using Network Policies #631

marwinski opened this issue Jan 7, 2019 · 7 comments
Labels
area/security Security related kind/enhancement Enhancement, improvement, extension platform/all topology/seed Affects Seed clusters

Comments

@marwinski
Copy link
Contributor

etcd shall be isolated using the following policies:

  1. only network traffic from the API server in the same namespace (for the same control plane) shall be allowed.
  2. no outgoing network traffic shall be allowed

(2) above might interfere with the backup infrastructure and might need further investigation.

@rfranzke
Copy link
Member

rfranzke commented Jan 7, 2019

Yes, ideally we get network policies that define fine-grained rules to only allow those components to talk to each other that really need to (not only etcd). @wyb1 started working on defining network policies for Prometheus, but I suggest that someone takes the time to investigate who needs to talk to whom and then - carefully and with an extended amount of tests - designs the network policies.

@rfranzke rfranzke added kind/enhancement Enhancement, improvement, extension area/security Security related status/accepted platform/all topology/seed Affects Seed clusters labels Jan 7, 2019
@rfranzke
Copy link
Member

rfranzke commented Jan 7, 2019

@adracus interested in this one?

@praveendhac
Copy link

Following up from the email conversation where I reported the issue first.
Issue was first reported on Gardener v0.12.0, then we did not have default NetworkPolicies on Seeds.
Current issue reported is on Gardener v0.14.1 where we have default NetworkPolicies for Seeds.

@rfranzke
Copy link
Member

rfranzke commented Jan 9, 2019

We currently only isolate the kube-apiserver as it is the only entrypoint into the seeds. Isolating the other components is definitely planned and desired, but not that critical, as nobody can directly talk to them.

@adracus
Copy link
Contributor

adracus commented Jan 11, 2019

@rfranzke I guess providing a block is very difficult with our current network policies. I think we rather require a bigger rework there, but as you also said, the priority right now is not high for this.

@gardener-robot-ci-1 gardener-robot-ci-1 added lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. and removed lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. labels Mar 14, 2019
@marwinski
Copy link
Contributor Author

@rfranzke, @mvladev: it appears that we have a good reason to rework the network policies. Any objections closing this ticket and working on a new - more general one?

@marwinski
Copy link
Contributor Author

closed for the more general issue #873

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/security Security related kind/enhancement Enhancement, improvement, extension platform/all topology/seed Affects Seed clusters
Projects
None yet
Development

No branches or pull requests

5 participants