-
Epic
-
Resolution: Unresolved
-
Critical
-
None
-
None
-
Implement Network Policies for LVMS
-
Done
-
Future Sustainability
-
0% To Do, 0% In Progress, 100% Done
-
False
-
-
False
-
Not Selected
-
S
-
None
-
5
Goal
Ship AdminNetworkPolicy during LVMS cluster installation
Why is this important?
This prevents multiple networking attacks, see
https://www.redhat.com/en/blog/using-adminnetworkpolicy-api-to-secure-openshift-cluster-networking
Scenarios
1. As a cluster administrator, I want to enforce non-overridable admin network policies that have to be adhered to by all user tenants in the cluster, thus securing my cluster’s network traffic.
2. As a cluster administrator, I want to implement specific network restrictions across multiple tenants (a tenant here refers to one or more namespaces), thus facilitating network multi-tenancy.
3. As a cluster administrator, I want to enforce the tenant isolation model (a tenant cannot receive traffic from any other tenant) as the cluster’s default network security standard, thus delegating the responsibility of explicitly allowing traffic from other tenants to the tenant owner using NetworkPolicies.
Acceptance Criteria
- CI - MUST be running successfully with tests automated
- Release Technical Enablement
- Policy templates installed during LVMS cluster installation
Done Checklist
- CI - CI is running, tests are automated and merged.
- Release Technical Enablement <link to Feature Enablement Presentation>
- DEV - Upstream code and tests merged: <link to meaningful PR or GitHub Issue>
- DEV - Upstream documentation merged: <link to meaningful PR or GitHub Issue>
- DEV - Downstream build attached to advisory: <link to errata>
- QE - Test plans in Polarion: <link or reference to Polarion>
- QE - Automated tests merged: <link or reference to automated tests>
- DOC - Downstream documentation merged: <link to meaningful PR>
- links to