You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Cluster admins want to have the confidence that application resources presented the Ingress Controller will not be presented on a set or range of ports.
For example: there is a particular range of ports that is forbidden from being used, or specifically reserved for one single application's traffic. And no other applications should be able to use these restricted ports.
The intention here is to provide configuration safety to the administrator that application users will never be able to define port listeners using a particular set/range of ports.
The resulting event that would be returned back to a resource trying to use a port in the blocked set/range is:
Events:
Type Reason Age From Message
---- ------ ---- ---- -------
Warning Rejected 38s nginx-ingress-controller [[]: Forbidden: port 80 is blocked, []: Forbidden: port 443 is blocked]
We have an open question.
There are currently two ways we can chose to enable this option for the Ingress Controller:
Both options would accomplish the same outcome.
A CLI Argument
args:
- -blocked-ports=80,443,8080,1000-1024
This option would require the Ingress Controller to be re-deployed if a port is added or removed from the list
This discussion was converted from issue #4443 on January 10, 2024 14:56.
Heading
Bold
Italic
Quote
Code
Link
Numbered list
Unordered list
Task list
Attach files
Mention
Reference
Menu
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
-
Cluster admins want to have the confidence that application resources presented the Ingress Controller will not be presented on a set or range of ports.
For example: there is a particular range of ports that is forbidden from being used, or specifically reserved for one single application's traffic. And no other applications should be able to use these restricted ports.
The intention here is to provide configuration safety to the administrator that application users will never be able to define port listeners using a particular set/range of ports.
The resulting event that would be returned back to a resource trying to use a port in the blocked set/range is:
We have an open question.
There are currently two ways we can chose to enable this option for the Ingress Controller:
Both options would accomplish the same outcome.
This option would require the Ingress Controller to be re-deployed if a port is added or removed from the list
This option, users could configure this list and apply it to their cluster without the need to re-deploy Ingress Controller.
Beta Was this translation helpful? Give feedback.
All reactions