Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow traffic between spokes by default #622

Merged
merged 12 commits into from
Jan 27, 2022
Merged

Conversation

Breanna-Stryker
Copy link
Contributor

Description

Changes include:
Allowing forwarded traffic by default
NSG allows traffic from peer spoke CIDR ranges
Firewall includes supernet rule to route traffic between spokes
Supernet parameter added for ease of use for end users

To test functionality, deploy MLZ, create VMs in two separate spokes, bastion into one and ping/ssh into the other VM.

Issue reference

The issue this PR will close: #608

Checklist

Please make sure you've completed the relevant tasks for this PR out of the following list:

  • All acceptance criteria in the backlog item are met
  • The documentation is updated to cover any new or changed features
  • Manual tests have passed
  • Relevant issues are linked to this PR

@Breanna-Stryker Breanna-Stryker requested a review from a team January 27, 2022 18:53
@glennmusa glennmusa self-requested a review January 27, 2022 19:00
@glennmusa glennmusa self-assigned this Jan 27, 2022
Copy link
Contributor

@glennmusa glennmusa left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

some naming nits

src/bicep/mlz.bicep Outdated Show resolved Hide resolved
src/bicep/modules/firewall.bicep Outdated Show resolved Hide resolved
src/bicep/modules/firewall.bicep Outdated Show resolved Hide resolved
Breanna-Stryker and others added 6 commits January 27, 2022 16:08
Co-authored-by: Glenn Musa <4622125+glennmusa@users.noreply.github.com>
Co-authored-by: Glenn Musa <4622125+glennmusa@users.noreply.github.com>
Co-authored-by: Glenn Musa <4622125+glennmusa@users.noreply.github.com>
Copy link
Contributor

@glennmusa glennmusa left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Works as described. I was able to Bastion into a hub jumpbox, then SSH into a VM in the Identity VNet, then from there SSH into a VM in the Operations VNet.

@glennmusa glennmusa merged commit 568c676 into main Jan 27, 2022
@glennmusa glennmusa deleted the breestryker/spoketraffic branch January 27, 2022 22:44
]
sourceIpGroups: []
destinationAddresses: [
'*'

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Shoud this be the suprnetIpAddress range versus '*'? I believe right now this would technically allow all outbound traffic from the spokes, no?

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

My thoughts exactly - this change allows all traffic within the VNets to access any address, including external, which breaks the "all other traffic is restricted by default" statement in https://github.com/Azure/missionlz/blob/main/README.md
@glennmusa @haithamshahin333 this looks like an unintended consequence of this change.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Tagging @kyle-hoyer on this

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This does need to be changed. I will update. Thank you

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
No open projects
Development

Successfully merging this pull request may close these issues.

Allow traffic between spokes by default
6 participants