You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently SecureComms supports opening tunnels between PP host and WN host.
This includes:
A client at the PP host can open a connection locally (127.0.0.1: serving as an inbound). The connection will be tunneled via the SecureComms SSH channel to the WN host (serving as outbound) and from there to a any service with IP addressable from the WN host.
A client at the WN host can open a connection locally (127.0.0.1: serving as an inbound). The connection will be tunneled via the SecureComms SSH channel to the PP host (serving as outbound) and from there to a any service with IP addressable from the PP host.
The proposed feature adds support for network namespace for inbounds such that in addition to the above we will support:
A client at at any network namespace of the PP host can open a connection locally (127.0.0.1: on that network namespace, serving as an inbound). The connection will be tunneled via the SecureComms SSH channel to the WN host (serving as outbound) and from there to a any service with IP addressable from the WN host.
A client at any network namespace of the WN host can open a connection locally (127.0.0.1: on that network namespace, serving as an inbound). The connection will be tunneled via the SecureComms SSH channel to the PP host (serving as outbound) and from there to a any service with IP addressable from the PP host.
The main use case is to allow opening tunnels from the podns network namespace in the PP. This will allow offering specific remote services to clients located at pod containers and exposing such services locally - i.e. at 127.0.0.1: on the podns network namespace. The container will be able to use a client and approach a local service which will be tunneled via the SecureComms SSH channel to the WN host from there it will be forwarded to any service that the WN can address.
The below diagram shows the relationship between the
Tunnel Inbound ====TUNNEL==== Tunnel Outbound
Client------------>Local Service Client------------->Remote Service
Container in Pod Pod Network WN Host Some URL
(`podns`)
The text was updated successfully, but these errors were encountered:
Currently SecureComms supports opening tunnels between PP host and WN host.
This includes:
The proposed feature adds support for network namespace for inbounds such that in addition to the above we will support:
The main use case is to allow opening tunnels from the
podns
network namespace in the PP. This will allow offering specific remote services to clients located at pod containers and exposing such services locally - i.e. at 127.0.0.1: on thepodns
network namespace. The container will be able to use a client and approach a local service which will be tunneled via the SecureComms SSH channel to the WN host from there it will be forwarded to any service that the WN can address.The below diagram shows the relationship between the
The text was updated successfully, but these errors were encountered: