-
Feature Request
-
Resolution: Unresolved
-
Major
-
None
-
None
-
False
-
None
-
False
-
Not Selected
-
-
-
Feature Overview
Separate internal OpenShift routes that have unique requirements such as mTLS from the default OCP ingress. This pattern is already used for the api.<cluster_name> endpoint, but not replicated for oauth-openshift.apps.<cluster_name>. This design decision creates confusion and complexity in implementation, maintenance and support of OCP clusters. We should give customers the flexibility to manage their application traffic however they desire outside of OCP on the *.apps domain and break the dependency on it for underlying internal OpenShift components whenever possible.
Goals
Red Hat would benefit from this feature by:
- Less ambiguity in the support requirements
- Fewer issues where oauth traffic is disrupted by upstream network devices and design
- Consistency in design where the applications that we support and maintain can have their own requirements outside of those the customer maintains
Customer Operations Teams would benefit from this feature by:
- Simplifying the documentation and installation instructions (app ingress vs api ingress)
Customer Security Teams would benefit from this feature by:
- Ability to implement policies (organizational or mandated) to application traffic that are needed with the strictest possible rules without impacting internal OCP functionality
- Greater visibility into traffic flows on the edge with decryption, inspection, and re-encryption of data in flight
- Simplified approval processes for OCP architecture with a clear delineation between application traffic and authorization traffic
Requirements
A list of specific needs or objectives that a Feature must deliver to satisfy the Feature. Some requirements will be flagged as MVP. If an MVP gets shifted, the feature shifts. If a non MVP requirement slips, it does not shift the feature.
Requirement | Notes | isMvp |
Customers can utilize Web Application Firewalls and SSL re-encryption upstream of their *.apps ingress for OCP | y | |
Dependencies within OCP that conflict with Web Application Firewalls and SSL re-encryption can be hosted separately from the *.apps default ingress | y | |
OCP dependencies that can’t support WAF and SSL decryption can be separated as part of the installation | y | |
OCP dependencies that can’t support WAF and SSL decryption can be separated on an existing cluster | y |
(Optional) Use Cases
Customer is federally mandated to decrypt and inspect all web application traffic at the edge
Customer wants to leverage a commercial Web Application Firewall like provided by CloudFlare
Customer’s policy/desire is to have SSL termination on the LB
Assumptions
The documentation should be explicit in what we can support for the default ingress. If that support is less than re-encryption support, or requires extensive customization it will impact our ability to sell to customers in regulated environments.
Customer Considerations
Customers, particularly in any sort of regulated environment (government, financial, healthcare, etc) often have security requirements that often require network inspection and SSL termination+reencryption outside of OpenShift.
- is incorporated by
-
OCPSTRAT-59 OCP WAF support
- New
- is related to
-
RFE-3360 Allow modifying ROUTER_SLOWLORIS_TIMEOUT variable in router configuration
- Accepted
-
RFE-3651 support for SSL bridging through an additional ingress controller
- Accepted
- relates to
-
RFE-3651 support for SSL bridging through an additional ingress controller
- Accepted
- links to