Navigation Menu

Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow configurable src range for type=loadbalancer firewall #20392

Closed
bprashanth opened this issue Jan 31, 2016 · 9 comments
Closed

Allow configurable src range for type=loadbalancer firewall #20392

bprashanth opened this issue Jan 31, 2016 · 9 comments
Assignees
Labels
sig/network Categorizes an issue or PR as relevant to SIG Network.

Comments

@bprashanth
Copy link
Contributor

Users can set an annotation denoting a trusted src range and we can apply that as the --source-ranges of the firewall.

@bprashanth bprashanth added sig/network Categorizes an issue or PR as relevant to SIG Network. team/cluster labels Jan 31, 2016
@freehan
Copy link
Contributor

freehan commented Feb 1, 2016

I can take this up if no one else is working on it.

@bprashanth
Copy link
Contributor Author

@a-robinson any objections/plans?

@a-robinson
Copy link
Contributor

You should double check the relevant AWS/OpenStack Neutron APIs to make avoid ruling out compatibility in them, but going for it SGTM.

@bprashanth
Copy link
Contributor Author

Agree with checking. but if this ends up being a sneaky features that is not x-plat, we can just prefix the annotation with ".gce" and have everyone else ignore it. @kubernetes/goog-cluster fyi

@thockin
Copy link
Member

thockin commented Feb 2, 2016

This is a good thing to try as an annotation, but we should just poke folks
to see if it works.

@justinsb @anguslees - do your respective load-balancer implementations
support restricting to a particular client IP range? If so, any
restrictions?

Whatever we do, this is particular to type=LoadBalancer, so it should say
so.

On Mon, Feb 1, 2016 at 3:51 PM, Prashanth B notifications@github.com
wrote:

Agree with checking. but if this ends up being a sneaky features that is
not x-plat, we can just prefix the annotation with ".gce" and have everyone
else ignore it. @kubernetes/goog-cluster
https://github.com/orgs/kubernetes/teams/goog-cluster fyi


Reply to this email directly or view it on GitHub
#20392 (comment)
.

@anguslees
Copy link
Member

These feature request bugs never explain what they're actually talking about :/ Assuming "apply that as the --source-ranges of the firewall" means only allowing certain remote source subnet(s) to access vip addresses on loadbalancers. I haven't experimented with the range of vendor drivers out there, but I fear the answer for OpenStack is "unsupported".

@justinsb
Copy link
Member

justinsb commented Feb 2, 2016

AWS uses security groups for ELB ingress, so yes, it does support CIDR ingress restrictions. (It also supports restricting access to instances in specific security groups).

I don't think it's unreasonable to throw an error if you try to create a LB on OpenStack with a CIDR source restriction. That's what we do e.g. if someone tries to create a UDP load balancer on AWS, and I haven't noticed many/any complaints about that. If it turns out to be important (if users report hitting the error) we could then implement IP filtering in e.g. kube-proxy.

I suspect as long as we eventually support filtering for L7 ingress that we'll cover most use cases.

@thockin
Copy link
Member

thockin commented Feb 11, 2016

As an evolution, it might be interesting to have per-namespace policy that enforces that services in a namespace must have a specific source-ips (or something like that)

@thockin
Copy link
Member

thockin commented Feb 23, 2016

I'm assigning this to next milestone to decide whether and how to promote the annotation to a full feature.

@thockin thockin added this to the next-candidate milestone Feb 23, 2016
k8s-github-robot pushed a commit that referenced this issue May 28, 2016
Automatic merge from submit-queue

promote sourceRange into service spec

@thockin  one more for your pile

I will add docs at `http://releases.k8s.io/HEAD/docs/user-guide/services-firewalls.md`

cc: @justinsb 

Fixes: #20392
k8s-github-robot pushed a commit that referenced this issue Oct 14, 2016
…urity-groups

Automatic merge from submit-queue

Security Group support for OpenStack Load Balancers

<!--  Thanks for sending a pull request!  Here are some tips for you:
1. If this is your first time, read our contributor guidelines https://github.com/kubernetes/kubernetes/blob/master/CONTRIBUTING.md and developer guide https://github.com/kubernetes/kubernetes/blob/master/docs/devel/development.md
2. If you want *faster* PR reviews, read how: https://github.com/kubernetes/kubernetes/blob/master/docs/devel/faster_reviews.md
3. Follow the instructions for writing a release note: https://github.com/kubernetes/kubernetes/blob/master/docs/devel/pull-requests.md#release-notes
-->

**Add Security Group Support for OpenStack Load Balancers**:

fixes #29745
adds OpenStack support to the work done in #20392

**Release note**:

```
This allows security groups to be created and attached to the neutron
port that the load balancer is using on the subnet.

The security group ID that is assigned to the nodes needs to be
provided, to allow for traffic from the load balancer to the nodePort
to be reflected in the rules.

This adds two config items to the LoadBalancer options -

ManageSecurityGroups (bool)
NodeSecurityGroupID  (string)
```
dims pushed a commit to dims/kubernetes that referenced this issue Feb 8, 2018
Automatic merge from submit-queue

promote sourceRange into service spec

@thockin  one more for your pile

I will add docs at `http://releases.k8s.io/HEAD/docs/user-guide/services-firewalls.md`

cc: @justinsb 

Fixes: kubernetes#20392
dims pushed a commit to dims/kubernetes that referenced this issue Feb 8, 2018
…lancer-security-groups

Automatic merge from submit-queue

Security Group support for OpenStack Load Balancers

<!--  Thanks for sending a pull request!  Here are some tips for you:
1. If this is your first time, read our contributor guidelines https://github.com/kubernetes/kubernetes/blob/master/CONTRIBUTING.md and developer guide https://github.com/kubernetes/kubernetes/blob/master/docs/devel/development.md
2. If you want *faster* PR reviews, read how: https://github.com/kubernetes/kubernetes/blob/master/docs/devel/faster_reviews.md
3. Follow the instructions for writing a release note: https://github.com/kubernetes/kubernetes/blob/master/docs/devel/pull-requests.md#release-notes
-->

**Add Security Group Support for OpenStack Load Balancers**:

fixes kubernetes#29745
adds OpenStack support to the work done in kubernetes#20392

**Release note**:

```
This allows security groups to be created and attached to the neutron
port that the load balancer is using on the subnet.

The security group ID that is assigned to the nodes needs to be
provided, to allow for traffic from the load balancer to the nodePort
to be reflected in the rules.

This adds two config items to the LoadBalancer options -

ManageSecurityGroups (bool)
NodeSecurityGroupID  (string)
```
openshift-publish-robot pushed a commit to openshift/kubernetes that referenced this issue Jul 26, 2018
UPSTREAM: 66249: fill in normal restmapping info with the legacy guess

Origin-commit: 0c4c2adde30ecd73cb895a2aaaecfc0cdf277921
openshift-publish-robot pushed a commit to openshift/kubernetes that referenced this issue Jan 29, 2019
UPSTREAM: 66249: fill in normal restmapping info with the legacy guess

Origin-commit: 0c4c2adde30ecd73cb895a2aaaecfc0cdf277921
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
sig/network Categorizes an issue or PR as relevant to SIG Network.
Projects
None yet
Development

No branches or pull requests

6 participants