-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Lock down Airflow and OGC API endpoints #201
Conversation
It looks like the pre-commit check is failing due to... having ingress rules allowing traffic from (a portion of) the public internet. Given that's the point, I think it's ignorable. Will move this PR from draft after testing. |
Hi Brad, I realize this is still a Draft PR, but I have a few questions for you:
|
locking down k8s ingress to newly created SG, with jpl-local rules and a specific rule (and check) for venue-services proxy
394a55f
to
ccde60f
Compare
Thanks- I didn't realize I could collapse that down nicely (the for_each).
Are you referring to |
Can those values be parsed out of the VPC data source or the VPC subnet data source? How did you find those values manually? |
confirmed security group and ingresses created in test deployment! However there's something up with the loadbalancer connections, as it seems to be returning a constant gateway timeout (504). I'm taking a look at the loadbalancer-controller documentation, but I think this I left out a required annotation. Testing that now. |
Yep, that was it. Can confirm security group set up, and can confirm traffic blocked from non-JPL addresses:
|
@LucaCinquini @drewm-jpl I think this is finally ready to go, unless you have any further changes? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice work! How did you manage to track down that missing annotation, that seems like it would've been tricky.
Can the OGC API still interact with the Airflow API? I imagine the answer should be yes, but could you try testing that?
The second footnote, here, clued me in.
I'll give it a try tomorrow (I want to doublecheck the venue-services proxy doesn't have issue with these changes either). Based on the container spec here, the ogc container's only configured reference to the airflow API is an internal kubernetes fqdn- a |
@jpl-btlunsfo, you can add the following comment above the new VPC SG ingress rules to have tfsec ignore the issues it flagged which we have deemed as safe.
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I was able to install this branch and verified the access from within the JPL network, and no access outside. I noticed that the SGs are tagged as "U-CS", should they be tagged as "U-SPS"?
Thanks for all the work.
The ones here?
Those are actually data-source lookups searching for the existing ECS venue proxy service, so yeah, they're |
Ah ok. Then I am good with the PR, thanks. |
Have confirmed the OGC api on my deployed instance doesn't have any issues deploying to airflow/API works. Going to go ahead and merge 🚀 |
Purpose
Proposed Changes
Issues
Testing