-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
model service network #401
Comments
From the link in the issue description I think the following CIDRs cover the service network: |
|
I know, right? Here is the quote from which I took those ranges (although I admit I don't understand some parts of it): Another option is to somehow scrape the list of CIDRs that follows and stick them into our grouping logic. I don't think we should work with the detailed list, but we have to use CIDRs that compactly contain that list. |
If so, we still need to remove it from public network, no? The question is whether VSI's are automatically open to those ranges, and I don't know how to check. |
|
great, then we are left with 161.26.0.0/16 and 166.8.0.0/14. |
Some of the model's public internet CIDRs (e.g.
161.26.0.0/16
) are actually service network and not public internet.Should model an internal router entity that enables connectivity to service network from each VPC, and remove those CIDRs from public internet.
@kyorav FYI
see https://cloud.ibm.com/docs/cloud-infrastructure?topic=cloud-infrastructure-ibm-cloud-ip-ranges#service-network
The text was updated successfully, but these errors were encountered: