You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Nov 14, 2022. It is now read-only.
In addition to supporting dynamic ASG derived from filtered credentials, there are use-cases for creating static ASG definitions regardless of the returned credentials.
One use-case, is a static-cred-broker that will provide an "all internet" service, possibly returning empty credentials.
Scenario 1:
Given a sec-group-filter deployed with the following specific configuration:
cf set-env always-apply-sec-group-definitions ' [ { "protocol": "tcp", "destination": "10.0.11.0-10.0.11.255", "ports": "80,443", "description": "Allow http and https traffic from ZoneA" }, { "protocol": "tcp", "destination": "10.0.12.0/24", "ports": "80,443", "description": "Allow http and https traffic from ZoneB" } ] '
When a filtered broker returns the following binding response (e.g. a static-cred configured to return an empty binding response)
{ }
Then the following ASG is created and bound to the corresponding application:
Rationale for scenario 2 is to simplify the implementation (previous behavior and existing specs are not affected). CF supports redundant security groups declarations.
The text was updated successfully, but these errors were encountered:
gberche-orange
changed the title
Static sec-groups for "all internet" access
Static sec-group ranges for "all internet" access
Feb 22, 2017
gberche-orange
changed the title
Static sec-group ranges for "all internet" access
Static sec-group ranges for "all internet" access use-case
Feb 22, 2017
In addition to supporting dynamic ASG derived from filtered credentials, there are use-cases for creating static ASG definitions regardless of the returned credentials.
One use-case, is a static-cred-broker that will provide an "all internet" service, possibly returning empty credentials.
Scenario 1:
Given a sec-group-filter deployed with the following specific configuration:
cf set-env always-apply-sec-group-definitions ' [ { "protocol": "tcp", "destination": "10.0.11.0-10.0.11.255", "ports": "80,443", "description": "Allow http and https traffic from ZoneA" }, { "protocol": "tcp", "destination": "10.0.12.0/24", "ports": "80,443", "description": "Allow http and https traffic from ZoneB" } ] '
When a filtered broker returns the following binding response (e.g. a static-cred configured to return an empty binding response)
Then the following ASG is created and bound to the corresponding application:
Optional scenario 2:
When a filtered broker returns the following binding response (e.g.
with developer-tripadvisor.com resolving to 23.21.145.5
Then the following ASG is created and bound to the corresponding application:
Rationale for scenario 2 is to simplify the implementation (previous behavior and existing specs are not affected). CF supports redundant security groups declarations.
The text was updated successfully, but these errors were encountered: