diff options
author | Maciej Wereski <m.wereski@partner.samsung.com> | 2021-07-27 12:50:25 +0000 |
---|---|---|
committer | Morgan Richomme <morgan.richomme@orange.com> | 2021-08-24 13:41:02 +0000 |
commit | a2e6b6e74d7e2503fe58b27336b82df0144a5e9b (patch) | |
tree | 7a9ad689e62213912996bb77ff97e371d246d891 /deployment/noheat | |
parent | 1583a651b3f1934cdf6c10e38ae526c31077a983 (diff) |
noheat deployment: loosen security groups constraints
Current rules may cause kubernetes services to be blocked. This may lead
to a lot of time wasted on debuging issues that aren't to any of
deployed components. After all patches are in place and working we might
try to come up with restricting Security Groups.
Issue-ID: INT-1601
Signed-off-by: Maciej Wereski <m.wereski@partner.samsung.com>
Change-Id: I2f36afefb72df1c4082bc9dda036713f4625ab46
Diffstat (limited to 'deployment/noheat')
-rw-r--r-- | deployment/noheat/infra-openstack/ansible/roles/create_securitygroup/tasks/create_securitygroup.yml | 15 |
1 files changed, 4 insertions, 11 deletions
diff --git a/deployment/noheat/infra-openstack/ansible/roles/create_securitygroup/tasks/create_securitygroup.yml b/deployment/noheat/infra-openstack/ansible/roles/create_securitygroup/tasks/create_securitygroup.yml index f389559ec..b9a3e2973 100644 --- a/deployment/noheat/infra-openstack/ansible/roles/create_securitygroup/tasks/create_securitygroup.yml +++ b/deployment/noheat/infra-openstack/ansible/roles/create_securitygroup/tasks/create_securitygroup.yml @@ -11,20 +11,13 @@ remote_ip_prefix: "{{ item }}" loop: "{{ secgrp.remote_ip_prefix }}" -- name: "Create {{ secgrp.name }} security group rule for SSH" +- name: "Create {{ secgrp.name }} security group rule for all TCP" os_security_group_rule: security_group: "{{ secgrp.name }}" protocol: tcp - port_range_min: 22 - port_range_max: 22 - remote_ip_prefix: "{{ item }}" - loop: "{{ secgrp.remote_ip_prefix }}" + remote_ip_prefix: "0.0.0.0/0" -- name: "Create {{ secgrp.name }} security group rule for ONAP Docker registry" +- name: "Create {{ secgrp.name }} security group rule for all UDP" os_security_group_rule: security_group: "{{ secgrp.name }}" - protocol: tcp - port_range_min: 10001 - port_range_max: 10001 - remote_ip_prefix: "{{ item }}" - loop: "{{ secgrp.local_ip_prefix }}" + protocol: udp |