Bug 2104241

Summary: Security group with multiple CIDR ranges
Product: [Red Hat Storage] Red Hat OpenShift Data Foundation Reporter: Kyle Bader <kbader>
Component: documentation-ODF-Managed-ServiceAssignee: Disha Walvekar <dwalveka>
Status: CLOSED COMPLETED QA Contact: Neha Berry <nberry>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: unspecifiedCC: odf-bz-bot
Target Milestone: ---   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-05-08 07:33:25 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Kyle Bader 2022-07-05 19:06:25 UTC
Describe the issue:

Our current documentation captures how to configure the `odf-sec-group` security group, and suggests that the source for the inbound rules be the VPC CIDR block. VPCs can have additional CIDR blocks added

https://docs.aws.amazon.com/vpc/latest/userguide/working-with-vpcs.html#add-ipv4-cidr

If a customer is deploying a provider cluster into a VPC with multiple CIDR blocks, then they need to create a distinct set of inbound rules for each block, with the CIDR block defined as the source for each respectively.