The Kubernetes-native platform (v2).
The Package manager for Kubernetes.
The Kubernetes-native Service Broker.
Workflow is not suitable for multi-tenant environments or hosting untrusted code.
A major goal of Workflow is to be operationally secure and trusted by operations engineers in every deployed environment. There are, however, two notable security-related considerations to be aware of when deploying Workflow.
Users of Workflow often want to deploy their applications to separate environments. Typically, physical network isolation isn’t the goal, but rather segregation of application environments - if a region goes haywire, it shouldn’t affect applications that are running in a separate region.
In Workflow, deployed applications can be segregated by using the
deis tags command. This enables
you to tag machines in your cluster with arbitrary metadata, then configure your applications to be
scheduled to machines which match the metadata.
For example, if some machines in your cluster are tagged with
region=us-west-1 and some
region=us-east-1, you can configure an application to be deployed to us-west-1
deis tags set region=us-west-1. Workflow will pass this configuration
along to Kubernetes, which will schedule your application in different regions.
See Isolate the Application for more information.
If you are running on a public cloud without security group features, you will have to set up
security groups yourself through either
iptables or a similar tool. The only ports on worker
nodes that should be exposed to the public are:
Enforcing a cluster-wide IP whitelist may be advisable for routers governing ingress to a cluster that hosts applications intended for a limited audience-- e.g. applications for internal use within an organization. You can enforce cluster-wide IP whitelisting by enabling whitelists, then attaching an annotation to the router:
$ kubectl --namespace=deis annotate deployments/deis-router router.deis.io/nginx.enforceWhitelists=true $ kubectl --namespace=deis annotate deployments/deis-router router.deis.io/nginx.defaultWhitelist="0.0.0.0/0"
The format is the same for the controller whitelist but you need to specify the whitelist directly to the controller's service. For example:
$ kubectl --namespace=deis annotate service deis-controller router.deis.io/whitelist="10.0.1.0/24,126.96.36.199"
And the same applies to applications. For example, to apply a whitelist to an application named
$ kubectl --namespace=example annotate service example-web router.deis.io/whitelist="10.0.1.0/24,188.8.131.52"
Application level whitelisting can also be done using the Deis client. To add/remove/list addresses of an application whitelist, use
$ deis whitelist:add 10.0.1.0/24,184.108.40.206 -a drafty-zaniness Adding 10.0.1.0/24,220.127.116.11 to drafty-zaniness whitelist...done $ deis whitelist:remove 18.104.22.168 -a drafty-zaniness Removing 22.214.171.124 from drafty-zaniness whitelist... done $ deis whitelist -a drafty-zaniness === drafty-zaniness Whitelisted Addresses 10.0.1.0/24