Network policies

IBM Industry Solutions Workbench now supports network policies that limit ingoing and outgoing traffic in the namespaces where Solution Designer and Solution Hub are running. Additionally, ingoing traffic is also limited for deployed projects designed and implemented with IBM Industry Solutions Workbench. While these network policies are enabled by default, the following chapter describes how you can disable and configure these security measures.

Warning:

Reviewing and changing the configuration of Egress is mandatory, otherwise IBM Industry Solutions Workbench is not able to work properly.

Ingress (ingoing traffic)

The ingress policy blocks traffic from outside into the namespace where IBM Industry Solutions Workbench is installed or the service project is deployed.

To disable the ingress policy, you need to configure the ISW Custom Resource and set values.global.network.ingressPolicy.enabled to "false". For more information how to configure this, see the documentation about the ISW Custom Resource. After the change the ingress network policy will be disabled for the namespace where IBM Industry Solutions Workbench is installed and all k5projects.

Egress (outgoing traffic)

The egress policy blocks traffic from the namespace where IBM Industry Solutions Workbench is installed to any destination outside the cluster (a Route on the same cluster is also seen as "outside the cluster"). K5projects though, are not affected by this policy.

Configure Egress

Every public route or destination must be specifically allowed in the EgressNetworkPolicy. To allow certain outgoing traffic, you need to configure the ISW Custom Resource and add entries to values.global.network.egressPolicy.allowList . For more information how to configure this, see the documentation about the ISW Custom Resource.

Disable Egress

To disable the egress policy, you need to configure the ISW Custom Resource and set values.global.network.egressPolicy.enabled to "false". For more information how to configure this, see the documentation about the ISW Custom Resource. After the change the egress network policy will be disabled for the namespace where IBM Industry Solutions Workbench is installed and outgoing traffic is not forbidden anymore.

Workaround for clusters without OpenShiftSDN

It is mandatory to use OpenShiftSDN as network plugin, otherwise EgressNetworkPolicy CustomResourceDefinition (CRD) is not available and does not work. If you use another network plugin than OpenShiftSDN and can not switch, you must apply the following workaround and disable Egress.

Step 1: Disable egress in deployment

  1. Open the ClusterServiceVersion of your IBM Industry Solutions Workbench Operator. That can be done by navigating in the web console to Operators -> Installed operators -> IBM Industry Solutions Workbench -> YAML
  2. Add the following environment variable to spec.install.spec.deployments[0].spec.template.spec.containers[0].env:
    - name: DISABLE_EGRESS
      value: 'true'

Step 2: Disable Egress

After disabling Egress in the deployment of the operator, you need to disable Egress in every ISW CustomResource as well, see the section Disable Egress.