Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

GCE Instance/Firewall/Router fix #170

Open
4 tasks
almahmoud opened this issue Jan 31, 2019 · 4 comments
Open
4 tasks

GCE Instance/Firewall/Router fix #170

almahmoud opened this issue Jan 31, 2019 · 4 comments
Labels
maybe Do if not too time consuming
Milestone

Comments

@almahmoud
Copy link
Collaborator

almahmoud commented Jan 31, 2019

  • GCE Instances currently get an automatic public IP. Ideally they'd only get a Private IP
  • Block internet access until routing is done properly through router/gateway
  • Default CIDR to '0.0.0.0/0' when fw rules are set without a target
  • Connectivity test suite
@nuwang
Copy link
Contributor

nuwang commented Jan 31, 2019

It seems like it should be ok to make the CIDR 0.0.0.0/0 for outgoing traffic, but perhaps not for incoming? Maybe the solution is to make the CIDR parameter mandatory? Not sure whether there'll be cascading impacts from this though.

@almahmoud
Copy link
Collaborator Author

I think in other providers it's not mandatory, and the current behavior is to default to all (I think as in I have not checked again right now). Idk if we can make cidr mandatory if we're also allowing to specify traffic coming through a specific route (I think it's set by network?), but not sure if that's universal for all of them. I can look more into it and see what good options would be. I guess what would be ideal scenario if you know? Then I can look how we can implement it and keep it consistent across providers.

@nuwang nuwang added this to the release 2.0.0 milestone Feb 3, 2019
@afgane afgane added the maybe Do if not too time consuming label Feb 5, 2019
@afgane afgane mentioned this issue Feb 5, 2019
@nuwang nuwang modified the milestones: release 2.0.0, release 2.1.0 Feb 14, 2019
@nuwang
Copy link
Contributor

nuwang commented Nov 19, 2019

@almahmoud Is this also fixed?

@selshowk
Copy link

I have my own implementation that uses private IPs for AWS and GCP (I have not yet tried to do so with Azure but I will soon) but a problem I am hitting is that by default internal IPs can't connect to the internet at all so instead one has to set up NATs and add them to the subnets. The docs for GCP and AWS are here:

https://cloud.google.com/nat/docs/gce-example#gcloud_5
https://docs.aws.amazon.com/vpc/latest/userguide/vpc-nat-gateway.html

Any thoughts on how hard this would be to implement? I'm looking at the GCP provider now and trying to also see if I can figure out the exact commands in the GCP API. Is there an easy way to translate the gcloud command here into an API command? I suspect there.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
maybe Do if not too time consuming
Projects
None yet
Development

No branches or pull requests

4 participants