Uploaded image for project: 'OpenShift Request For Enhancement'
  1. OpenShift Request For Enhancement
  2. RFE-8645

Feature to Restrict or Blacklist Traffic to OpenShift Routes from Specific CIDRs

XMLWordPrintable

    • Icon: Feature Request Feature Request
    • Resolution: Unresolved
    • Icon: Minor Minor
    • None
    • None
    • Network - Core
    • None
    • Product / Portfolio Work
    • None
    • False
    • Hide

      None

      Show
      None
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None

      Many customers have a requirement to block or restrict access to OpenShift routes from specific CIDR ranges while allowing traffic from all other CIDRs.

      Currently, OpenShift provides the haproxy.router.openshift.io/ip_whitelist route annotation, which allows administrators to explicitly permit traffic from specified CIDRs while denying all other sources. However, this approach effectively enforces an allowlist model rather than a denylist.

      Several customers prefer a denylist-based approach, as it is operationally simpler for their use cases. With the current allowlist mechanism, customers must continuously maintain and update the ip_whitelist annotation to include all permitted CIDRs, which can be cumbersome and error-prone, especially in dynamic or frequently changing network environments.

      Providing native support for blacklisting or restricting traffic from specific CIDR ranges at the route level would significantly simplify access control management and better align with customer expectations and operational workflows.

              mcurry@redhat.com Marc Curry
              rhn-support-aygarg Ayush Garg
              None
              Votes:
              1 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated:
                None
                None