Bug 2104241 - Security group with multiple CIDR ranges
Summary: Security group with multiple CIDR ranges
Keywords:
Status: CLOSED COMPLETED
Alias: None
Product: Red Hat OpenShift Data Foundation
Classification: Red Hat Storage
Component: documentation-ODF-Managed-Service
Version: unspecified
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
: ---
Assignee: Disha Walvekar
QA Contact: Neha Berry
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2022-07-05 19:06 UTC by Kyle Bader
Modified: 2023-08-09 16:46 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2023-05-08 07:33:25 UTC
Embargoed:


Attachments (Terms of Use)

Description Kyle Bader 2022-07-05 19:06:25 UTC
Describe the issue:

Our current documentation captures how to configure the `odf-sec-group` security group, and suggests that the source for the inbound rules be the VPC CIDR block. VPCs can have additional CIDR blocks added

https://docs.aws.amazon.com/vpc/latest/userguide/working-with-vpcs.html#add-ipv4-cidr

If a customer is deploying a provider cluster into a VPC with multiple CIDR blocks, then they need to create a distinct set of inbound rules for each block, with the CIDR block defined as the source for each respectively.


Note You need to log in before you can comment on or make changes to this bug.