Networking Configuration
Additional Network Allowances
Applications deployed in UDS Core utilize Network Policies with a “Deny by Default” configuration to ensure network traffic is restricted to only what is necessary. Some applications in UDS Core allow for overrides to accommodate environment-specific requirements.
Prometheus Stack
The Prometheus stack in UDS Core creates the necessary Network Policies (netpols) to ensure interoperability within UDS Core. However, in certain environments, you may want to allow traffic from the Prometheus stack to reach other services (potentially outside the cluster). To facilitate this, we provide a way to configure additional netpols for the Prometheus stack.
For example, you might want to allow Alertmanager to send alerts to an external service (such as a Slack or Mattermost Webhook).
To accomplish this, you can provide a bundle override as follows:
The example above allows Alertmanager to send alerts to any external destination. Alternatively, you could use the remoteNamespace key to specify another namespace within the Kubernetes cluster.
Referencing the following spec for Allow for all available fields.
Vector
It may also be desired to allow Vector to send logs to an external service. To facilitate this, you can provide a bundle override as follows:
The example above allows Vector to send logs to an Elastic instance in the elastic namespace and to an S3 storage service.
Referencing the following spec for Allow for all available fields.