Bug 1567062
| Summary: | [RFE] Kuryr project namespace isolation | |||
|---|---|---|---|---|
| Product: | Red Hat OpenStack | Reporter: | Luis Tomas Bolivar <ltomasbo> | |
| Component: | openstack-kuryr-kubernetes | Assignee: | Luis Tomas Bolivar <ltomasbo> | |
| Status: | CLOSED ERRATA | QA Contact: | Jon Uriarte <juriarte> | |
| Severity: | high | Docs Contact: | ||
| Priority: | high | |||
| Version: | 14.0 (Rocky) | CC: | achernet, asegurap, ltomasbo, racedoro, tsedovic | |
| Target Milestone: | Upstream M2 | Keywords: | FutureFeature, Triaged | |
| Target Release: | 14.0 (Rocky) | |||
| Hardware: | Unspecified | |||
| OS: | Unspecified | |||
| Whiteboard: | ||||
| Fixed In Version: | openstack-kuryr-kubernetes-0.4.2-0.20180404104924.985c387.el7ost | Doc Type: | Release Note | |
| Doc Text: |
A new feature is included to add project namespace isolation between pods/svcs at different projects. This is achieved by creating a new network/subnet per project/namespace as well as limiting access between projects through security groups.
A new namespace handler is added to reach to project creation/deletion events. In addition, a new kuryr subnet driver is introduced to create the new subnet per project (including the network and its connection to the router) upon namespace creation events. Finally, a new kuryr security group driver is added to handle the isolation between the projects (as well as enabling access from the default project to any other project and vice-versa).
To enable this functionality at the controller, the namespace handler and the related drivers need to be enabled:
[kubernetes]
enabled_handlers=vif,lb,lbaasspec,namespace
pod_subnets_driver = namespace
pod_security_groups_driver = namespace
service_security_groups_driver = namespace
More information can be found on: https://docs.openstack.org/kuryr-kubernetes/latest/installation/network_namespace.html
|
Story Points: | --- | |
| Clone Of: | ||||
| : | 1629573 (view as bug list) | Environment: | ||
| Last Closed: | 2019-01-11 11:49:31 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 1585217, 1614643, 1629573 | |||
|
Description
Luis Tomas Bolivar
2018-04-13 11:20:07 UTC
It should cover the default openshift namespace isolation: * All pods of the default namespace/project should be able to pods/svcs of an other project. * All pods of the default namespace/project should be reachable from any other project pods. * Pods of non-default namespace/project can only talk to pods/svcs of the same project (and the above points). Adding patch sets covering the isolation Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHEA-2019:0045 |