Uploaded image for project: 'OpenShift Container Platform (OCP) Strategy'
  1. OpenShift Container Platform (OCP) Strategy
  2. OCPSTRAT-369

Support HyperShift Private Clusters on AWS

    XMLWordPrintable

Details

    • False
    • False
    • OCPPLAN-9733HyperShift: Central Control-Plane Management (aka Hosted Control Planes)
    • 100
    • 100% 100%
    • Undefined
    • 0
    • 0

    Description

      Feature Overview

      Private cluster adds an extra level of isolation usually achieved through tighter network policies. This might be needed for security/privacy reasons.

      Private clusters affect different components in HyperShift's architecture. For example, how the control-plane communicates with the data-plane and vice-versa. In normal cases, it is assumed that control-plane endpoints (e.g., API-server, tunnel, OAuth, ...) are accessible via a public end-point, with private cluster deployments, this is no longer the case. Furthermore, depending on the infrastructure management models [1], the nodes might be configured to egress through public IPs or via a Gateway.

      Goal(s)

      • Determine whether private clusters are desirable for HyperShift, if so expose this as an option for HyperShift cluster (e.g., in the API).
      • Consider the different options to achieve private networking:
        • VPC peering - Relies on provider-specific features and might break the homogeneity
        • Tunneling - Stateful reverse proxies that keep track of initiated connections.

      Note: this feature might require sync with the OSD and SD teams as they already have a model to address private cluster deployments for standalone OpenShift.

      Attachments

        Activity

          People

            sjenning Seth Jennings
            azaalouk Adel Zaalouk
            Votes:
            0 Vote for this issue
            Watchers:
            3 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved: