Inbound network access is only available for workloads of types
serverless
, standard
, and stateful
. For other workload types, only outbound firewall settings are relevant.External
The external firewall is used to control Internet traffic to/from a workload.YAML
Inbound Requests
- By default, all inbound requests are disabled.
- Access is granted by explicitly adding one or more IPv4 / IPv6 / CIDR addresses or allowing all addresses.
- Using the UI:
- Multiple addresses can be entered within the textbox by delimiting each address with either a comma or space.
- An import file can be uploaded containing each address on its own line or delimited with either a comma or space.
The CIDR address
0.0.0.0/0
allows full inbound access from the public Internet.Outbound Requests
- By default, all outbound requests are disabled.
- By default, or by specifying NO outbound ports, all are ALLOWED.
- When outbound ports are specified, only traffic to those ports will be allowed.
- Access is granted by explicitly adding one or more IPv4 / IPv6 / CIDR addresses or public hostnames or allowing all addresses / hostnames.
- When using a hostname, only ports 80, 443, and 445 will be reachable. To allow all ports, enable all outbound requests.
- When using an IP or CIDR, all ports will be reachable.
- The IP/CIDR addresses takes precedence over hostnames.
- Using the UI:
- Multiple addresses can be entered within the textbox by delimiting each address with either a comma or space.
- An import file can be uploaded containing each address on its own line or delimited with either a comma or space.
The CIDR address
0.0.0.0/0
allows full outbound access to the public Internet.Blocked Addresses
All addresses specified will be blocked from outbound/inbound requests to/from this workloadYAML
- Blocking an address has the same effect as not including it in the allow CIDR list
Inbound HTTP Header Filter
Using theinboundHeaderFilter
field, you can filter out requests that do not meet certain http header criteria. You can permit permit headers that contain a specific header/value pair or deny them.
This can be used in conjunction with geo-headers, to allow/deny requests originating from specific locations.
If multiple allow or deny filters are specified, the resulting operation will be triggered if ANY value is matched. It does not have to match all of them.
The values are regular expressions (RE2)
Examples
Only allows requests with the foo header, with any value:YAML
YAML
Since the values are regular expressions, ^ must be put at the start and $ at the end to match a whole string (and not also match strings
like
"barbell"
)Geo Filtering
The inbound header filter can be configured to be used in conjunction with geo headers. Here is an example where we only allow requests coming from the United StatesYAML
Internal
The internal firewall is used to control access between other workloads within an org. Only the ports listed in the workload containers array will be made accessible to other workloads. This example allows workloads running in the same GVC to access this workload.YAML
YAML
YAML
none
: No access is allowed between workloads.same-gvc
: Workloads running in the same GVC are accessible.same-org
: Workloads running in the same org are accessible.workload-list
: Specific workloads are allowed to access this workload.- These workloads can be from the same or different GVCs.
- The user configuring this setting must have the
view
permission, set within a policy, on the workload being specified. - Use
inboundAllowWorkload
to list out the allowed workloads using their links.