Skip to content

Commit 434f349

Browse files
authoredAug 1, 2024··
fix: account for keycloak HA ports (#619)
## Description Fixes a number of issues to fix support Keycloak for HA deployments * scopes AuthorizationPolicy to port 8080 (http) to avoid denying JGroups traffic * adds 7800 and 57800 to headless service and pod to ensure Istio routes traffic correctly. * adds network policy to allow internamespace traffic on 7800 + 57800 Note: It was not immediately obvious that port 57800 is used by Keycloak's HA deployment. I noticed traffic on 57800 when debugging and did some research and determined it was related to used for Infinispan's "failure discovery protocol". The number is computed based on the [port offset](https://infinispan.org/docs/stable/titles/server/server.html#jgroups-system-properties_cluster-transport), so port offset (50000) + 7800 = 57800. ## Related Issue Fixes #620 ## Type of change - [x] Bug fix (non-breaking change which fixes an issue) - [ ] New feature (non-breaking change which adds functionality) - [ ] Other (security config, docs update, etc) ## Checklist before merging - [ ] Test, docs, adr added or updated as needed - [ ] [Contributor Guide](https://github.com/defenseunicorns/uds-template-capability/blob/main/CONTRIBUTING.md) followed
1 parent fc881a0 commit 434f349

File tree

7 files changed

+42
-5
lines changed

7 files changed

+42
-5
lines changed
 

‎.github/workflows/slim-dev-test.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ on:
1111
- src/istio/*
1212
- src/prometheus-stack/*
1313
- packages/slim-dev/*
14-
- bundles/core-slim-dev/*
14+
- bundles/k3d-slim-dev/*
1515
- .github/workflows/slim-dev*
1616

1717
# Permissions for the GITHUB_TOKEN used by the workflow.

‎bundles/k3d-slim-dev/uds-bundle.yaml

-2
Original file line numberDiff line numberDiff line change
@@ -36,8 +36,6 @@ packages:
3636
# x-release-please-start-version
3737
ref: 0.24.1
3838
# x-release-please-end
39-
optionalComponents:
40-
- metrics-server
4139
overrides:
4240
istio-admin-gateway:
4341
uds-istio-config:

‎src/istio/oscal-component.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -425,6 +425,7 @@ component-definition:
425425
"to": [
426426
{
427427
"operation": {
428+
"ports": ["8080"],
428429
"paths": ["/admin*", "/realms/master*"]
429430
}
430431
}

‎src/keycloak/chart/templates/istio-admin.yaml

+12-1
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,8 @@ spec:
1212
rules:
1313
- to:
1414
- operation:
15+
ports:
16+
- "8080"
1517
paths:
1618
- "/admin*"
1719
- "/realms/master*"
@@ -21,6 +23,8 @@ spec:
2123
- istio-admin-gateway
2224
- to:
2325
- operation:
26+
ports:
27+
- "8080"
2428
paths:
2529
- /metrics*
2630
from:
@@ -30,16 +34,23 @@ spec:
3034
- monitoring
3135
- to:
3236
- operation:
37+
ports:
38+
- "8080"
3339
paths:
3440
# Never allow anonymous client registration except from the pepr-system namespace
3541
# This is another fallback protection, as the KC policy already blocks it
3642
- "/realms/{{ .Values.realm }}/clients-registrations/*"
3743
from:
3844
- source:
39-
notNamespaces: ["pepr-system"]
45+
notNamespaces:
46+
- "pepr-system"
4047
- when:
4148
- key: request.headers[istio-mtls-client-certificate]
4249
values: ["*"]
50+
to:
51+
- operation:
52+
ports:
53+
- "8080"
4354
from:
4455
- source:
4556
notNamespaces:

‎src/keycloak/chart/templates/service-headless.yaml

+8
Original file line numberDiff line numberDiff line change
@@ -14,5 +14,13 @@ spec:
1414
port: 80
1515
targetPort: http
1616
protocol: TCP
17+
- name: tcp
18+
port: 7800
19+
targetPort: tcp
20+
protocol: TCP
21+
- name: tcp-fd
22+
port: 57800
23+
targetPort: tcp-fd
24+
protocol: TCP
1725
selector:
1826
{{- include "keycloak.selectorLabels" . | nindent 4 }}

‎src/keycloak/chart/templates/statefulset.yaml

+7-1
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ spec:
136136
# java opts for jgroups required for infinispan distributed cache when using the kubernetes stack.
137137
# https://www.keycloak.org/server/caching
138138
- name: JAVA_OPTS_APPEND
139-
value: -Djgroups.dns.query={{ include "keycloak.fullname" . }}-headless
139+
value: -Djgroups.dns.query={{ include "keycloak.fullname" . }}-headless.keycloak.svc.cluster.local
140140

141141
# Postgres database configuration
142142
- name: KC_DB
@@ -189,6 +189,12 @@ spec:
189189
- name: http
190190
containerPort: 8080
191191
protocol: TCP
192+
- name: tcp
193+
containerPort: 7800
194+
protocol: TCP
195+
- name: tcp-fd
196+
containerPort: 57800
197+
protocol: TCP
192198
livenessProbe:
193199
httpGet:
194200
path: /health/live

‎src/keycloak/chart/templates/uds-package.yaml

+13
Original file line numberDiff line numberDiff line change
@@ -60,6 +60,19 @@ spec:
6060
port: {{ .Values.postgresql.port }}
6161
remoteGenerated: Anywhere
6262
{{- end }}
63+
{{- if .Values.autoscaling.enabled }}
64+
# HA for keycloak
65+
- direction: Ingress
66+
remoteGenerated: IntraNamespace
67+
ports:
68+
- 7800
69+
- 57800
70+
- direction: Egress
71+
remoteGenerated: IntraNamespace
72+
ports:
73+
- 7800
74+
- 57800
75+
{{- end }}
6376

6477
expose:
6578
- description: "remove private paths from public gateway"

0 commit comments

Comments
 (0)
Please sign in to comment.