[NE-27439] public facing nginx ingress protected by fastly#1
[NE-27439] public facing nginx ingress protected by fastly#1
Conversation
b0087f2 to
b6fb5fc
Compare
b6fb5fc to
e6840d1
Compare
|
adding @alexmolev for visibility on the WAF effort PR tested to deploy fine with: helm upgrade -i saas-manager cloudify-manager-worker -n saas-manager -f cloudify-manager-worker/values.saas_manager.dev.yaml --set nginx.fastly.accesskeyid=c58a1da9-9504-4600-bc98-170b7c665347 --set nginx.fastly.secretaccesskey=hxEt8ReHbqGVrxgj6tMlu3JIy8aWR03m91l5viZ4RRw using pre-deployed secrets (not using terragrunt templating, just helm) ! issues to pick up on now related to nginx code and fastly : Fastly container inside the cloudify manager pod comes up with RPC listen: 2024/04/14 16:23:45.614904 Signal Sciences Agent 4.53.0 starting as user sigsci with PID 1, Max open files=65535, Max data size=unlimited, Max address space=unlimited, Max stack size=8388608 but Fastly managed service does not get nor list the requests to the manager pod ! i have kept k8s-secrets encrypted , please decrypt first with sops to use and test |
e6840d1 to
8c2ccc4
Compare
There was a problem hiding this comment.
Just started to review but looks like I have not enough context for purpose of this.
I have couple of general questions before we can proceed:
- Why we need this fork from community cloudify chart? Not sure if we support it.
- Why community cloudify chart need fastly? Pretty sure we are not using it in any of our internal installations.
- I see dev/test/prod values there with hosts like "saas-manager.pub.nativeedge.dell.com" inside but I'm pretty sure we are not using this chart for saas-manager. Something was changed?
- This is public repo so we need to be extremely wariness about any things committed inside it. Even if it is not secret data formally better to not leak any information about our internal infrastructure (like aws account id) if possible.
| @@ -0,0 +1,109 @@ | |||
| apiVersion: ENC[AES256_GCM,data:cUQ=,iv:hy/ZdP1le16X3DmD82wU1ESBUsmlVfWwtgDrl6QQyfs=,tag:tjK4GQ0ZpbkT4jsbJR6ICA==,type:str] | |||
There was a problem hiding this comment.
We should not use things like this inside the helm chart. If you want to encrypt something using 3rd-party tool - you need to do it in override values outside chart.
Also this is a public repo, even if we have secrets encrypted some information from this file should not be public-available like AWS KMS ARN, which includes AWS account ID (non-secret but can be used for reduce attack surface).
| apiVersion: v1 | ||
| kind: Secret | ||
| metadata: | ||
| name: sigsci.fusion |
There was a problem hiding this comment.
why "fusion" if it is community cloudify?
…fastly
need help on secrets