Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create network policies #239

Open
keyvaann opened this issue May 23, 2023 · 0 comments
Open

Create network policies #239

keyvaann opened this issue May 23, 2023 · 0 comments
Assignees
Labels
enhancement New feature or request
Milestone

Comments

@keyvaann
Copy link
Collaborator

keyvaann commented May 23, 2023

Currently our applications have free outbound access to internet and other services, it will be a good practice to limit them.
List of applications that need internet access and what services they're trying to access:

  • Radar-fitbit-connector, radar-rest-sources-backend: Fitbit
  • Radar-grafana: Fetch plugins and optionally email
  • Management-portal: Email
  • Alertmanager: Notifications via Slack or other sources
  • Appserver: Firebase
  • Cert-manager: Lets encrypt certificates
  • Radar-push-endpoint: Garmin

If you using managed services that are outside of the cluster more applications need to have access:

  • radar-rest-source-backend, management-portal and appconfig need to access the PostgreSQL database
  • radar-output and radar-rest-source-backend need to access Redis
  • radar-jdbc-connector and radar-grafana need to reach a Timescaledb instance
  • radar-s3-connector, catalog-server, radar-jdbc-connector, radar-fitbit-connecotr, schema-registry, radar-gateway, radar-backend need to reach Kafka
  • radar-gateway, radar-rest-sources-backend, app-config, radar-grafana, radar-output, radar-fitbit-connector, radar-push-endpoint need to access ManagementPortal

These lists are not exhaustive but they should be a good start.
We can define some general policies but they probably won't cover every use case so there also be some documentation on how to customize the network access.

More information:
https://kubernetes.io/docs/concepts/services-networking/network-policies/

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant