Bookmark this page

Summary

  • With OpenShift routes, you can expose your applications to external networks securely.

  • The types of secure routes are edge, passthrough, and re-encryption.

  • With network policies, you can configure isolation policies for individual pods.

  • You can use network policies to create logical zones in the SDN that map to your organization network zones.

  • In contrast to traditional firewalls, Kubernetes network policies control network traffic between pods by using labels instead of IP addresses.

  • OpenShift provides the service-ca controller to generate and sign service certificates for internal traffic.

  • To generate a certificate and key pair, apply the service.beta.openshift.io/serving-cert-secret-name=your-secret annotation to a service.

  • OpenShift can inject its CA into configuration maps with a custom annotation. Client applications can use these configuration maps to validate connections to services that run in the cluster.

Revision: do280-4.14-08d11e1