Uploaded image for project: 'OpenShift Request For Enhancement'
  1. OpenShift Request For Enhancement
  2. RFE-8590

Add support for AWS S3 VPC Endpoints to enable secure, private S3 bucket access

XMLWordPrintable

    • Icon: Feature Request Feature Request
    • Resolution: Unresolved
    • Icon: Critical Critical
    • None
    • openshift-4.19, openshift-4.20
    • Logging
    • None
    • Product / Portfolio Work
    • None
    • False
    • Hide

      None

      Show
      None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None

      1. Proposed title of this feature request

      Add support for AWS S3 VPC Endpoints to enable secure, private S3 bucket access

      2. What is the nature and description of the request?

      This is a mandated security requirement by the Bank Infosec team to ensure all traffic to S3 storage is private, bypassing the public internet to mitigate security risks and control costs.

      3. Why does the customer need this? (List the business requirements here)

      The use of private networking for all AWS services to comply with security and cost policies, specifically requiring the use of AWS S3 VPC Endpoints instead of public S3 URLs.

      The current implementation of the Red Hat Loki Operator (v6.0.9) forces logging traffic to be routed via the public Internet Gateway to access S3 storage, resulting in a non-compliant state and potential security risks flagged by the Infosec team. This limitation blocks the secure deployment and continued operation of the logging stack.
      4. List any affected packages or components.

      Platform: Red Hat OpenShift Container Platform (OCP) 4.16 (Approaching EUS)

      Affected Components/Versions:

      Loki Operator 6.0.9

      OpenShift Logging 6.0.6

      OADP Operator 1.3.3

      Backend Storage: AWS S3

      Ongoing Upstream issue: https://github.com/grafana/loki/pull/19247

              jamparke@redhat.com Jamie Parker
              rhn-support-samrinha SAYED AMRIN HANIF
              None
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

                Created:
                Updated:
                None
                None