-
Notifications
You must be signed in to change notification settings - Fork 435
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
✨ Allow more permissive extensibility for securityRules and additional CP LoadBalancers #5525
base: main
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -111,9 +111,22 @@ | |
// +optional | ||
ControlPlaneOutboundLB *LoadBalancerSpec `json:"controlPlaneOutboundLB,omitempty"` | ||
|
||
// AdditionalControlPlaneLBPorts is the configuration for the additional inbound control-plane load balancer ports | ||
// +optional | ||
AdditionalControlPlaneLBPorts []LoadBalancerPort `json:"additionalControlPlaneLBPorts,omitempty"` | ||
|
||
NetworkClassSpec `json:",inline"` | ||
} | ||
|
||
// LoadBalancerPort specifies additional port for the API server load balancer. | ||
type LoadBalancerPort struct { | ||
// Name for the additional port within LB definition | ||
Name string `json:"name"` | ||
|
||
// Port for the LB definition | ||
Port int32 `json:"port"` | ||
} | ||
|
||
// VnetSpec configures an Azure virtual network. | ||
type VnetSpec struct { | ||
// ResourceGroup is the name of the resource group of the existing virtual network | ||
|
@@ -893,6 +906,17 @@ | |
return false | ||
} | ||
|
||
// GetSecurityRuleByDestination returns security group rule, which matches provided destination ports. | ||
func (s SubnetSpec) GetSecurityRuleByDestination(ports string) *SecurityRule { | ||
for _, rule := range s.SecurityGroup.SecurityRules { | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Probably for the long term, we should change |
||
if rule.DestinationPorts != nil && *rule.DestinationPorts == ports { | ||
return &rule | ||
} | ||
} | ||
|
||
return nil | ||
} | ||
|
||
// SecurityProfile specifies the Security profile settings for a | ||
// virtual machine or virtual machine scale set. | ||
type SecurityProfile struct { | ||
|
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -266,6 +266,7 @@ func (s *ClusterScope) LBSpecs() []azure.ResourceSpecGetter { | |
BackendPoolName: s.APIServerLB().BackendPool.Name, | ||
IdleTimeoutInMinutes: s.APIServerLB().IdleTimeoutInMinutes, | ||
AdditionalTags: s.AdditionalTags(), | ||
AdditionalPorts: s.ControlPlaneAdditionalLBPorts(), | ||
} | ||
|
||
if s.APIServerLB().FrontendIPs != nil { | ||
|
@@ -299,6 +300,7 @@ func (s *ClusterScope) LBSpecs() []azure.ResourceSpecGetter { | |
BackendPoolName: s.APIServerLB().BackendPool.Name + "-internal", | ||
IdleTimeoutInMinutes: s.APIServerLB().IdleTimeoutInMinutes, | ||
AdditionalTags: s.AdditionalTags(), | ||
AdditionalPorts: s.ControlPlaneAdditionalLBPorts(), | ||
} | ||
|
||
privateIPFound := false | ||
|
@@ -771,6 +773,11 @@ func (s *ClusterScope) ControlPlaneOutboundLB() *infrav1.LoadBalancerSpec { | |
return s.AzureCluster.Spec.NetworkSpec.ControlPlaneOutboundLB | ||
} | ||
|
||
// ControlPlaneAdditionalLBPorts returns the additional API server ports list. | ||
func (s *ClusterScope) ControlPlaneAdditionalLBPorts() []infrav1.LoadBalancerPort { | ||
return s.AzureCluster.Spec.NetworkSpec.AdditionalControlPlaneLBPorts | ||
} | ||
|
||
// APIServerLBName returns the API Server LB name. | ||
func (s *ClusterScope) APIServerLBName() string { | ||
apiServerLB := s.APIServerLB() | ||
|
@@ -1020,9 +1027,15 @@ func (s *ClusterScope) SetControlPlaneSecurityRules() { | |
if !s.ControlPlaneEnabled() { | ||
return | ||
} | ||
if s.ControlPlaneSubnet().SecurityGroup.SecurityRules == nil { | ||
subnet := s.ControlPlaneSubnet() | ||
subnet.SecurityGroup.SecurityRules = infrav1.SecurityRules{ | ||
|
||
subnet := s.ControlPlaneSubnet() | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. in this flow where are we adding any user-provided security rules? (for example if a user specifies TCP or is that elsewhere and the purpose of this change is to filter out There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This flow performs only defaulting on top of the user-provided set of rules, which may not be empty. This way having a field populated does not always need to specify all allowed ports, only additional ones or overrides. I’m currently validating how this works in tandem with ClusterClass definitions we have. The desired goal is to permit specifying If it doesn’t work, maybe it would still require additional LB rules. |
||
|
||
if subnet.SecurityGroup.SecurityRules == nil { | ||
s.AzureCluster.Spec.NetworkSpec.UpdateControlPlaneSubnet(subnet) | ||
} | ||
|
||
if subnet.GetSecurityRuleByDestination("22") == nil { | ||
subnet.SecurityGroup.SecurityRules = append(s.ControlPlaneSubnet().SecurityGroup.SecurityRules, | ||
infrav1.SecurityRule{ | ||
Name: "allow_ssh", | ||
Description: "Allow SSH", | ||
|
@@ -1034,20 +1047,26 @@ func (s *ClusterScope) SetControlPlaneSecurityRules() { | |
Destination: ptr.To("*"), | ||
DestinationPorts: ptr.To("22"), | ||
Action: infrav1.SecurityRuleActionAllow, | ||
}, | ||
infrav1.SecurityRule{ | ||
Name: "allow_apiserver", | ||
Description: "Allow K8s API Server", | ||
Priority: 2201, | ||
Protocol: infrav1.SecurityGroupProtocolTCP, | ||
Direction: infrav1.SecurityRuleDirectionInbound, | ||
Source: ptr.To("*"), | ||
SourcePorts: ptr.To("*"), | ||
Destination: ptr.To("*"), | ||
DestinationPorts: ptr.To(strconv.Itoa(int(s.APIServerPort()))), | ||
Action: infrav1.SecurityRuleActionAllow, | ||
}, | ||
} | ||
}) | ||
|
||
s.AzureCluster.Spec.NetworkSpec.UpdateControlPlaneSubnet(subnet) | ||
} | ||
|
||
port := strconv.Itoa(int(s.APIServerPort())) | ||
if subnet.GetSecurityRuleByDestination(port) == nil { | ||
subnet.SecurityGroup.SecurityRules = append(s.ControlPlaneSubnet().SecurityGroup.SecurityRules, infrav1.SecurityRule{ | ||
Name: "allow_apiserver", | ||
Description: "Allow K8s API Server", | ||
Priority: 2201, | ||
Protocol: infrav1.SecurityGroupProtocolTCP, | ||
Direction: infrav1.SecurityRuleDirectionInbound, | ||
Source: ptr.To("*"), | ||
SourcePorts: ptr.To("*"), | ||
Destination: ptr.To("*"), | ||
DestinationPorts: ptr.To(port), | ||
Action: infrav1.SecurityRuleActionAllow, | ||
}) | ||
|
||
s.AzureCluster.Spec.NetworkSpec.UpdateControlPlaneSubnet(subnet) | ||
} | ||
} | ||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -114,8 +114,13 @@ Security Rules were previously known as `ingressRule` in v1alpha3. | |
</aside> | ||
|
||
Security rules can also be customized as part of the subnet specification in a custom network spec. | ||
Note that ingress rules for the Kubernetes API Server port (default 6443) and SSH (22) are automatically added to the controlplane subnet only if security rules aren't specified. | ||
It is the responsibility of the user to supply those rules themselves if using custom rules. | ||
|
||
Note that ingress rules for the Kubernetes API Server port (default 6443) and SSH (22) are automatically added to the controlplane subnet if these security rules aren't specified. | ||
It is the responsibility of the user to override those rules themselves when the default configuration does not match expected ruleset. | ||
|
||
These rules are identified by `destinationPorts` value: | ||
- `<API_SERVER_PORT>` for the API server access. Default port is `6443`. | ||
- `22` for the SSH access. | ||
|
||
Here is an illustrative example of customizing rules that builds on the one above by adding an egress rule to the control plane nodes: | ||
|
||
|
@@ -141,22 +146,22 @@ spec: | |
name: my-subnet-cp-nsg | ||
securityRules: | ||
- name: "allow_ssh" | ||
description: "allow SSH" | ||
description: "Deny SSH" | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Why are we updating this example to a There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I wanted to showcase that even though port 22 is defaulted, the rule for this can be overridden to deny it. |
||
direction: "Inbound" | ||
priority: 2200 | ||
protocol: "*" | ||
destination: "*" | ||
destinationPorts: "22" | ||
source: "*" | ||
sourcePorts: "*" | ||
action: "Allow" | ||
action: "Deny" | ||
- name: "allow_apiserver" | ||
description: "Allow K8s API Server" | ||
description: "Allow Custom K8s API Server" | ||
direction: "Inbound" | ||
priority: 2201 | ||
protocol: "*" | ||
destination: "*" | ||
destinationPorts: "6443" | ||
destinationPorts: "1234" # Custom API server URL | ||
source: "*" | ||
sourcePorts: "*" | ||
action: "Allow" | ||
|
@@ -177,6 +182,49 @@ spec: | |
resourceGroup: cluster-example | ||
``` | ||
|
||
Alternatively, when default server `securityRules` apply, but the list needs to be extended, only required rules can be added, like so: | ||
|
||
```yaml | ||
apiVersion: infrastructure.cluster.x-k8s.io/v1beta1 | ||
kind: AzureCluster | ||
metadata: | ||
name: cluster-example | ||
namespace: default | ||
spec: | ||
location: southcentralus | ||
networkSpec: | ||
vnet: | ||
name: my-vnet | ||
cidrBlocks: | ||
- 10.0.0.0/16 | ||
additionalControlPlaneLBPorts: | ||
- name: RKE2 | ||
port: 9345 | ||
subnets: | ||
- name: my-subnet-cp | ||
role: control-plane | ||
cidrBlocks: | ||
- 10.0.1.0/24 | ||
securityGroup: | ||
name: my-subnet-cp-nsg | ||
securityRules: | ||
- name: "allow_port_9345" | ||
description: "RKE2 - allow node registration on port 9345" | ||
direction: "Inbound" | ||
priority: 2202 | ||
protocol: "Tcp" | ||
destination: "*" | ||
destinationPorts: "9345" | ||
source: "*" | ||
sourcePorts: "*" | ||
action: "Allow" | ||
- name: my-subnet-node | ||
role: node | ||
cidrBlocks: | ||
- 10.0.2.0/24 | ||
resourceGroup: cluster-example | ||
``` | ||
|
||
### Virtual Network service endpoints | ||
|
||
Sometimes it's desirable to use [Virtual Network service endpoints](https://learn.microsoft.com/azure/virtual-network/virtual-network-service-endpoints-overview) to establish secure and direct connectivity to Azure services from your subnet(s). Service Endpoints are configured on a per-subnet basis. Vnets managed by either `AzureCluster` or `AzureManagedControlPlane` can have `serviceEndpoints` optionally set on each subnet. | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
port
seems to be holding a single port here.There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It was originally like so, but users can supply a list o ports with this, like
22,443