Uploaded image for project: 'OpenShift Bugs'
  1. OpenShift Bugs
  2. OCPBUGS-64775

[azure] network security rule "allow_ssh" for port 22 should be deleted

XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Unresolved
    • Icon: Undefined Undefined
    • None
    • 4.21
    • None
    • Quality / Stability / Reliability
    • False
    • Hide

      None

      Show
      None
    • None
    • Moderate
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None

      Description of problem:

      During testing PR https://github.com/openshift/installer/pull/9773 and https://github.com/openshift/installer/pull/10059 , new network nsg rule "alllow_ssh" for port 22 is created and never deleted after installation.
      
      $ az network nsg rule list --nsg-name jima05subnetd-n5jjr-nsg -g jima05subnetd-n5jjr-rg -otable
      Name                                                      ResourceGroup           Priority    SourcePortRanges    SourceAddressPrefixes    SourceASG    Access    Protocol    Direction    DestinationPortRanges    DestinationAddressPrefixes    DestinationASG
      --------------------------------------------------------  ----------------------  ----------  ------------------  -----------------------  -----------  --------  ----------  -----------  -----------------------  ----------------------------  ----------------
      apiserver_in                                              jima05subnetd-n5jjr-rg  101         *                   *                        None         Allow     Tcp         Inbound      6443                     *                             None
      k8s-azure-lb_allow_IPv4_556f7044ec033071ec0dfcf7cd85bc93  jima05subnetd-n5jjr-rg  500         *                   Internet                 None         Allow     Tcp         Inbound      443 80                   20.225.5.134                  None
      allow_ssh                                                 jima05subnetd-n5jjr-rg  2200        *                   *                        None         Allow     Tcp         Inbound      22                       *                             None

      Version-Release number of selected component (if applicable):

          4.21 

      How reproducible:

          Always

      Steps to Reproduce:

          1. Build image with PR installer#10059
          2. create cluster
          3.
          

      Actual results:

          nsg rule "allow_ssh" for port 22 is created

      Expected results:

          nsg rule "allow_ssh" for port 22 should not be created

      Additional info:

          slack thread: https://redhat-internal.slack.com/archives/C01V1DP387R/p1762344654245479

              sdasu@redhat.com Sandhya Dasu
              jinyunma Jinyun Ma
              None
              None
              Jinyun Ma Jinyun Ma
              None
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

                Created:
                Updated: