Uploaded image for project: 'OpenShift Request For Enhancement'
  1. OpenShift Request For Enhancement
  2. RFE-4666

Ingress Node Firewall - Allow Multiple ports/port-ranges within Single rule

XMLWordPrintable

    • Icon: Feature Request Feature Request
    • Resolution: Unresolved
    • Icon: Normal Normal
    • None
    • None
    • SDN
    • False
    • None
    • False
    • Not Selected

      1. Proposed title of this feature request
      Ingress Node Firewall Operator - Allow Multiple ports/port-ranges within a single rule

      2. What is the nature and description of the request?

      Currently Ingress Node Firewall (IngressNodeFirewall) supports definition of either a single port or a range of ports within a single rule. So for each port or port range, a specific rule set to be created for the same Source CIDR. In order to allow/deny multiple ports within a same rule, `comma` separated values (sample pasted below) would bring more value to customers using this operator thus they don't need to create multiple rule(s) for each port or port-range. 

      spec:
        ingress:
          - rules:
              - action: Allow
                order: 10
                protocolConfig:
                  tcp:
                    ports: 22,80,443,2379-2380,3100,32000-32767
                  protocol: TCP
            sourceCIDRs:
              - 192.168.40.10/32

      3. Why does the customer need this? (List the business requirements here)

      Firstly, it simplifies the definition of adding/modifying/removing ports within IngressNodeFirewall.
      Secondly, from customer point of view, it will be easier to manage multiple port or port-range definitions within single array of rule instead of opening multiple rules for each port or range customer would like to define. 

      4. List any affected packages or components.
      N/A

              ddharwar@redhat.com Deepthi Dharwar
              rh-ee-raravi Ramachandran Ravi
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

                Created:
                Updated: