Skip to content

246 - Network Security rules onboarding

Arturo Hernandez [EPAM] requested to merge feature/ah-246-pe-redis into master

Infrastructure Submissions:


  • [YES] Have you added an explanation of what your changes do and why you'd like us to include them?
  • [YES] I have updated the documentation accordingly.
  • [YES] I have added tests to cover my changes.
  • [YES] All new and existing tests passed.
  • [YES] I have formatted the terraform code. (terraform fmt -recursive && go fmt ./...)

Current Behavior or Linked Issues


Related to: #246 (closed)

  • Backend managed services should have restricted connectivity (Cosmos, redis, kv, postgres), only AKS nodes should be able to reach those.
  • For development environments flag can be disabled to allow public network access.
  • Implemented private_endpoints.tf at service resources for redis resources mapping.
  • Created docs to manage the backend_services_accesses enable.

Does this introduce a breaking change?


  • [NO] However, there might be a service downtime when appliying this changes in Redis, already documented how to overcome this in docs/upgrades/private_endpoints.md
  • DNS Cache must be flushed in the pod and sdk to take new ip of private endpoint.

MR Guildelines

  • Paste TF Plan for the MR.

sr-plan.txt it is the only affected stage as for now.

Other information


Precursor for this mr: !770 (closed)

Edited by Arturo Hernandez [EPAM]

Merge request reports

Loading