You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Oct 21, 2022. It is now read-only.
As cluster admin I want to ensure that my network (overlay and underlay) is secured by network policies. I additionally can rely on IaaS security groups and other features.
After an investigation of this suggestion, I really like the idea of closing some open doors with calico directly. We have to find a good integration. For a prototype I did the following steps to get the policies into the cluster:
Create an example pod and a service (bound to host port)
Create a pod to apply calico GlobalNetworkPolicy
Add a clusterrole which allows the creation of GlobalNetworkPolicy to the service account
Thanks for your suggestion and sorry that it took us so long to reply. I took a deeper look into Calico and how we could use its features in Karydia.
First, I checked if it is reasonable to add Calico features to Karydia with an appropriate effort, which is definitely the case. I already tested out an implementation sketch to use/apply Calico-managed resources (e.g. GlobalNetworkPolicies and NetworkPolicies) with Karydia (also described here):
Create a service account with sufficient permission for creating the defined policies
Run a pod with calicoctl that applies the policies and other calico-specific resources
Kill the pod after it is finished
Remove all calico-related resources created by Karydia if Karydia is deleted
During this test scenario, I had some troubles using HostEndpoints as Karydia is running within the cluster and does not have an overview of all endpoints. Moreover, I am not sure how the use-case would look like and which security benefits should be achieved by your proposed implementation idea. Can you give us some more information about the usage of HostEndpoints within the NetworkPolicies and your motives behind this approach?
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Description
Support & Checks for Host Security
User Story
As cluster admin I want to ensure that my network (overlay and underlay) is secured by network policies. I additionally can rely on IaaS security groups and other features.
[OPTIONAL] Implementation idea
Calico offers Host Endpoint objects to secure at the host level:
https://docs.projectcalico.org/v3.8/security/host-endpoints/
The text was updated successfully, but these errors were encountered: