Skip to content

Commit cae03cd

Browse files
authored
Merge pull request #859 from oracle/updates
add security considerations back to User Guide
2 parents 96178cb + 9c4a731 commit cae03cd

File tree

1 file changed

+18
-0
lines changed

1 file changed

+18
-0
lines changed

site/user-guide.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -66,6 +66,24 @@ You can have one or more operators in your Kubernetes cluster that manage one or
6666
We provide a Helm chart to manage the installation and configuration of the operator.
6767
Detailed instructions are available [here](install.md).
6868

69+
## Exposing applications outside the Kubernetes cluster
70+
The operator can configure services to expose WebLogic applications and features outside of the Kubernetes cluster. Care should be taken when exposing anything externally to ensure that the appropriate security considerations are taken into account. In this regard, there is no significant difference between a WebLogic domain running in a Kubernetes cluster and a domain running in a traditional data center. The same kinds of considerations should be taken into account, for example:
71+
72+
* Only expose those protocols and ports that need to be exposed.
73+
* Use secure protocols (HTTPS, T3S, and such).
74+
* Use custom channels to restrict the protocols that are exposed.
75+
* Is load balancing required?
76+
* Is certificate-based integrity needed?
77+
* How will users authenticate?
78+
* Is the network channel encrypted?
79+
* Is exposing RMI required (T3 enables RMI), or IIOP, or would HTTP alone suffice?
80+
* Is it necessary to expose admin-capable channels?
81+
* Is it required to expose default channels (these accept T3/RMI, and by default, accept administrative traffic)?
82+
83+
While it is natural to expose web applications outside the cluster, exposing administrative features like the Administration Console and a T3 channel for WLST should be given more careful consideration. There are alternative options that should be weighed. For example, Kubernetes provides the ability to securely access a shell running in a container in a pod in the cluster. WLST could be executed from such an environment, meaning the T3 communications are entirely within the Kubernetes cluster and therefore more secure.
84+
85+
Oracle recommends careful consideration before deciding to expose any administrative interfaces externally.
86+
6987
## Operator Docker image
7088

7189
You can find the operator image in

0 commit comments

Comments
 (0)