Redis security
Namespace access
By default, Redis can be accessed only from the namespace it was issued. To access Redis from other namespaces the service must be configured.
apiVersion: vshn.appcat.vshn.io/v1
kind: VSHNRedis
metadata:
name: redis-app1-prod
namespace: prod-app
spec:
parameters:
security:
allowedNamespaces:
- redis-prod (1)
allowAllNamespaces: false (2)
writeConnectionSecretToRef:
name: redis-creds-connection
1 | List of namespaces to be allowed to access Redis |
2 | Allows access to Redis from any namespace in the cluster. Supersedes allowedNamespaces if true. |
Namespace RBAC
On APPUiO Cloud, every member of the same organization to which the claim namespace belongs to has limited access to the namespace for debugging and port-fowarding.
On APPUiO Managed, we don’t have this construct and no RBAC rules are deployed by default.
However, it is possible to specify a list of Groups
or Users
that should have that limited access to the namespace.
This can be done using the two fields allowedGroups
and allowedUsers
:
apiVersion: vshn.appcat.vshn.io/v1
kind: VSHNRedis
metadata:
name: redis-app1-prod
namespace: prod-app
spec:
parameters:
security:
allowedGroups: (1)
- my-dev-engineers
- my-support-engineers
allowedUsers: (2)
- my-special-user
writeConnectionSecretToRef:
name: redis-creds-connection
1 | List of groups to be allowed limited access to the Redis namespace |
2 | List of users to be allowed limited access to the Redis namespace |