Replies: 1 comment 8 replies
-
The easy fix is to make sure redis binds to 127.0.0.1 then no external access is possible and only the containers in the pod can access it. Podman does not have ant sort of firewall rules to prevent such access from other containers on the same network. The only way is to have the containers on different networks and make sure you are using --opt=isolate=strict option for the networks. |
Beta Was this translation helpful? Give feedback.
8 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
As I understand, the main upside of pods is that we can share the network space across different containers of the same service, and they can access each other via localhost.
With PublishPort I can restrict only certain ports to be accessible from host. For example if I've a multi-container service paperless made up of 3 containers - redis container paperless_broker, postgres container paperless_db and web UI container paperless_webserver. They can access each other over localhost (Eg: redis://localhost:6379) without needing port 6379 being exposed to host. Now if there's containers from a completely different service (say svc2) running on the same network, there's no restriction. A malicious actor inside this svc2 can access 6379 or simliar containers.
Is there a some concept where I can specify something like OpenPorts=<>, and then have podman generate firewall rules that just block all other ports coming over the podman network?
Beta Was this translation helpful? Give feedback.
All reactions