Harden the xinetd security
In galera_server role we allow anyone to know galera state, from any network by default. We change this behavior here, to allow only the nodes from galera_all and haproxy_all to query the galera state. Change-Id: Ieb3a8315a7599f850ba922da4c782230bd850125
This commit is contained in:
parent
d5773de2a8
commit
f959acfa5c
@ -27,6 +27,11 @@ galera_container_bind_mounts:
|
||||
# See https://bugs.launchpad.net/openstack-ansible/+bug/1697531 for details.
|
||||
galera_disable_privatedevices: "{{ ((properties.is_metal | default(false)) | bool) | ternary('false', 'true') }}"
|
||||
|
||||
# By default galera_monitoring xinetd app is open to 0.0.0.0/0
|
||||
# This makes sure the monitoring is only restricted to the necessary nodes:
|
||||
# the load balancers, and the galera nodes.
|
||||
galera_monitoring_allowed_source: "{% for node in galera_cluster_members + groups['haproxy_all'] %}{{ node }} {% endfor %}"
|
||||
|
||||
# Galera sessions are long lived, so if we do endpoint maintenance we will
|
||||
# force kill the sessions to force a failover to the active endpoint.
|
||||
haproxy_shutdown_sessions: yes
|
||||
|
Loading…
Reference in New Issue
Block a user