UNCLASSIFIED - NO CUI

Skip to content

Resolve "Egress Whitelist - Keycloak"

Samuel Sarnowski requested to merge 119-keycloak-sidecar into main

General MR

Summary

Bigbang testing MR: big-bang/bigbang!4377 (closed)

This MR introduces a Sidecar and a set of ServiceEntries for Keycloak when istio.enabled: true and istio.hardened.enabled: true. This is in support of big-bang&160.

Relevant logs/screenshots

(Include any relevant logs/screenshots)

Linked Issue

#119 (closed)

Upgrade Notices

A Sidecar resource has been added to the keycloak namespace that disallows egress to endpoints that are not part of the Istio service registry (a.k.a REGISTRY_ONLY). The outboundTrafficPolicy.mode in the Sidecar can be configured, however, to be something other than REGISTRY_ONLY if desired by setting istio.hardened.outboundTrafficPolicyMode. This provides a redundant layer of network security in addition to NetworkPolicies. This Sidecar is disabled by default but can be enabled by setting istio.enabled: true and istio.hardened.enabled: true.

Additional custom ServiceEntries can be created by populating the istio.hardened.customServiceEntries list.

Edited by Samuel Sarnowski

Merge request reports