Uploaded image for project: 'OpenShift Request For Enhancement'
  1. OpenShift Request For Enhancement
  2. RFE-7189

Add support for Admin Network Policy for secondary-UDNs

XMLWordPrintable

    • Icon: Feature Request Feature Request
    • Resolution: Unresolved
    • Icon: Undefined Undefined
    • None
    • None
    • Network - Core
    • None
    • Product / Portfolio Work
    • None
    • False
    • Hide

      None

      Show
      None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None

      1. Proposed title of this feature request
      "Admin Network Policy for secondary-UDNs"

      2. What is the nature and description of the request?
      Customers using localnet (e.g. OpenShift Virtualization users) need a way to control access to networks in secondary UDNs in a way similar to AdminNetworkPolicy. This way they can allow certain resources to all pods, while denying access to others.

      This could either be:

      • Another new API like MNPs.
      • Or a re-purposing existing ANP API to be multi-network aware.

      3. Why does the customer need this? (List the business requirements here)
      Customers need a way to layer access controls such that required common services from outside (such as LDAP and other services) are allowed while access to other services are denied. Further, the project owners need to be to add services specific to the project on top of the core ACLs defined by the administator in the context of secondary UDNs.

      4. List any affected packages or components.
      UDN

              mcurry@redhat.com Marc Curry
              rhn-gps-jrfuller Johnray Fuller
              None
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

                Created:
                Updated:
                None
                None