Skip to content

Commit

Permalink
Add security rules for Cilium
Browse files Browse the repository at this point in the history
Signed-off-by: michal.gubricky <[email protected]>
  • Loading branch information
michal-gubricky committed Jul 11, 2024
1 parent 96e00ed commit a7b5ad1
Showing 1 changed file with 31 additions and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,37 @@ spec:
allowedCIDRs: {{ .Values.restrict_kubeapi }}
{{- end }}
managedSecurityGroups:
allowAllInClusterTraffic: true
allNodesSecurityGroupRules:
- remoteManagedGroups:
- controlplane
- worker
direction: ingress
etherType: IPv4
name: VXLAN (Cilium)
portRangeMin: 8472
portRangeMax: 8472
protocol: udp
description: "Allow VXLAN traffic for Cilium"
- remoteManagedGroups:
- controlplane
- worker
direction: ingress
etherType: IPv4
name: HealthCheck (Cilium)
portRangeMin: 4240
portRangeMax: 4240
protocol: tcp
description: "Allow HealthCheck traffic for Cilium"
- remoteManagedGroups:
- controlplane
- worker
direction: ingress
etherType: IPv4
name: Hubble (Cilium)
portRangeMin: 4244
portRangeMax: 4244
protocol: tcp
description: "Allow Hubble traffic for Cilium"
managedSubnets:
- cidr: {{ .Values.node_cidr }}
dnsNameservers:
Expand Down

0 comments on commit a7b5ad1

Please sign in to comment.