Migrating from a private service endpoint allowlist to context based restrictions (CBR)
To provide more functionality and a better user experience, master private service endpoint allowlists are being deprecated in favor of context based restrictions (CBR). Support for master private service endpoint allowlists ends on 10 February 2025. If your clusters have master private service endpoint allowlists enabled, complete the following steps to migrate to using context based restrictions (CBR).
The following instructions cover protecting the private service endpoint of your cluster by using CBR rules. If your cluster has both a public and private service endpoint (PSE), you can also protect your cluster's public service endpoint with CBR.
Some advantages of CBR include:
- Target multiple clusters in an account at once and not have to set the list for each one.
- Allow access from specific VPCs, not just IPs or subnets.
- Set higher limits of up to 200 private and 500 public IPs or subnets, rather than a max total of 75 with PSE.
- Create and manage CBR rules from the console, API, or CLI.
- Restrict public access via CBR. The private service endpoint allowlist only restricts private service endpoint traffic.
Before you begin
If you are already using CBR rules to protect your clusters, then these instructions might not fit your use case. Instead, use the CBR documentation to understand how to modify your existing CBR rules to include the private service endpoint allowlist subnets. For more information about CBR, see Protecting cluster resources with context-based restrictions and the example context-based restrictions scenarios.
Before you start creating CBR zones and rules, verify that your private service endpoint allowlist is working as expected. After you set up CBR, you can re-run these tests to confirm the same behavior.
1 Access your Red Hat OpenShift cluster.. Target the private service endpoint from a client system that uses a private IP that is in one of the custom subnets on your allowlist.
-
Run the following command to verify that allowed IPs can connect to the PSE.
oc get nodes
1 Access your Red Hat OpenShift cluster.. Target the private service endpoint from an IP addressed that is all to verify you can connect.
1 Access your Red Hat OpenShift cluster.. Target the private service endpoint from a client system that uses a private IP that is not allowed in your allowlist.
- Re-run the previous command again to verify that IPs that aren't in the allowlist can't connect to the PSE.
Now that you've verified your allowlist is working as expected, you can continue with the migration.
Step 1: Review the details of your allowlist
-
Get your PSE allowlist details.
If a PSE allowlist is not enabled on your cluster, the command fails and the error indicates that this feature is disabled. In this case, your cluster requires no further action.
ibmcloud oc cluster master private-service-endpoint allowlist get -c CLUSTER
Example output
Subnet Type Status 10.138.53.64/26 System Active 10.30.50.0/24 Custom Active 10.249.94.103/32 Custom Active OK laptop
-
Review the output and make a note of the Custom subnets. These subnets are used later.
- The System entries are migrated automatically and can be ignored. These entries make sure the cluster workers are allowed to connect to the cluster apiserver.
- The Custom entries are the subnets that you have added that are allowed to connect to this cluster's private service endpoint. The subnets
10.30.50.0/24
and10.249.94.103/32
in the example are added to a CBR network zone in the next step.
Step 2: Creating a network zone
Create a CBR network zone that contains the same subnets as your existing custom private service endpoint allowlist.
Creating a network zone in the console
-
Click Create.
-
Provide the details for your network zone.
- Name: Give your network zone a name.
- Allowed IP addresses: Enter the subnets you found in the earlier step.
-
Click Next to review the details of your network zone.
-
Click Create to finish creating your network zone.
Creating a network zone by using the CLI
-
Create a network zone from the CLI by running a command similar to one of the following examples.
The
cbr zone-create
command syntax.ibmcloud cbr zone-create [--name NAME] [--description DESCRIPTION] [--addresses ADDRESSES] [--excluded EXCLUDED] [--vpc VPC] [--service-ref SERVICE-REF] [--file FILE]
The
--addresses
parameter must be a comma separated list of subnets that you found in the step above in your private service endpoint allowlist.Example command to create a network zone for a single cluster.
ibmcloud cbr zone-create --name private-subnets-for-cluster-XXXXXX --description "Private subnets that are allowed to access the apisever of cluster XXXXXX" --addresses 10.30.50.0/24,10.249.94.103/32
CBR zone create example 1 Parameter Description --name
Give your network zone a name. --description
Provide an optional description of the zone. --addresses
Enter the subnets that you found in your master service endpoint allowlist in the previous step. Example command to create a network zone for all clusters in your account.
ibmcloud cbr zone-create --name private-subnets-for-all-clusters --description "Private subnets that are allowed to access my clusters" --addresses 10.30.50.0/24,10.249.94.103/32
CBR zone create example 1 Parameter Description --name
Give your network zone a name. --description
Provide an optional description of the zone. --addresses
Enter the subnets that you found in your master service endpoint allowlist in the previous step. -
Create a CBR rule to protect your cluster with CBR. This rule references your cluster, or all clusters in this account, and also references the network zone that you created.
Step 3: Creating a CBR rule
Create a CBR rule that references the network zone that you created. You can create CBR rules in the console, CLI, or API.
Creating a CBR rule in the console
-
Navigate to your network zones in the CBR console.
-
Click the List of actions on your and click Edit.
-
Add or remove subnets, VPCs, or services to your network zone to control which resources can access one or more of your clusters.
Creating a CBR rule by using the CLI
The following instructions describe how to use the CLI to create a network zone.
-
List your network zones and note the ID of the network zone that you created in the earlier step.
ibmcloud cbr zones
-
Create a CBR rule. You can create a rule to protect a single cluster or all clusters in your account.
The
cbr rule-create
command syntax.ibmcloud cbr rule-create [--description DESCRIPTION] [--context-attributes CONTEXT-ATTRIBUTES] [--resource-attributes RESOURCE-ATTRIBUTES] [--region REGION] [--resource RESOURCE] [--resource-group-id RESOURCE-GROUP-ID] [--resource-type RESOURCE-TYPE] [--service-instance SERVICE-INSTANCE-GUID] [--service-name SERVICE-NAME] [--zone-id ZONE-ID] [--tags TAGS] [--enforcement-mode ENFORCEMENT-MODE] [--file FILE]
If your cluster has a public service endpoint, you must include the
--context-attributes endpointType=public
parameter so that traffic is allowed to the public service endpoint. If you don't include this option, all public traffic is blocked.Example command that uses the
CLUSTER-ID
of the cluster and theNETWORK-ZONE-ID
of the network zone from the earlier step to create a CBR rule to protect only this cluster.ibmcloud cbr rule-create --api-types crn:v1:bluemix:public:containers-kubernetes::::api-type:cluster --description "Protect private endpoint for cluster CLUSTER" --service-name containers-kubernetes --service-instance CLUSTER-ID --context-attributes endpointType=private,networkZoneId=NETWORK-ZONE-ID --context-attributes endpointType=public
CBR rule create example 1 Parameter Description --api-types
The crn:v1:bluemix:public:containers-kubernetes::::api-type:cluster
value indicates the cluster control plane master APIs. For more information about the API types for Red Hat OpenShift on IBM Cloud, see Protecting specific APIs.--description
An optional description of the rule. --service-name containers-kubernetes
The containers-kubernetes
value indicates Red Hat OpenShift on IBM Cloud as the target service for the rule.--service-instance CLUSTER-ID
Specify the CLUSTER-ID
of the cluster you want to protect.--context-attributes endpointType=private,networkZoneId=NETWORK-ZONE-ID
The option allows only resources in the NETWORK-ZONE-ID
zone to access the cluster's private endpoint.--context-attributes endpointType=public
This option allows all resources to access the cluster's public endpoint. networkZoneId
Specify the NETWORK-ZONE-ID
of the zone you created earlier.Example command that uses the
NETWORK-ZONE-ID
of the network zone from the earlier step to create a CBR rule that protects all clusters in this account.ibmcloud cbr rule-create --api-types crn:v1:bluemix:public:containers-kubernetes::::api-type:cluster --description "Protect private endpoint for all clusters" --service-name containers-kubernetes --context-attributes endpointType=private,networkZoneId=NETWORK-ZONE-ID --context-attributes endpointType=public
CBR rule create example 2 Parameter Description --api-types
The crn:v1:bluemix:public:containers-kubernetes::::api-type:cluster
value indicates the cluster control plane master APIs. For more information about the API types for Red Hat OpenShift on IBM Cloud, see Protecting specific APIs.--description
An optional description of the rule. --service-name
The containers-kubernetes
value indicates Red Hat OpenShift on IBM Cloud as the target service for the rule.--context-attributes endpointType=private,networkZoneId=NETWORK-ZONE-ID
The option allows only resources in the NETWORK-ZONE-ID
zone to access the cluster's private endpoint.--context-attributes endpointType=public
This options allows all resources to access the cluster's public endpoint. networkZoneId
Specify the NETWORK-ZONE-ID
of the zone you created earlier.
When creating a rule, if you see an error message that says A rule with the same resource attributes already exists
, then you already have a CBR rule protecting your cluster. In this case, you must update your existing rule to
add your network zone. For more information, see the CBR rule-update documentation.
Step 4: Disabling the private service endpoint allowlist
Now that your cluster's private service endpoint is protected by a CBR rule, you can disable your private service endpoint allowlist.
Run the following command.
ibmcloud oc cluster master private-service-endpoint allowlist disable -c CLUSTER
Step 5: Testing the CBR rule
Now that the CBR rule is protecting your cluster's private service endpoint, verify it is working as expected. Run the same tests that you completed earlier.
-
{[target_ both]}.
-
Run the following command against this cluster using a
kubeconfig
that targets the private service endpoint.oc get nodes
-
Test this command from both a client system using a private IP that is in one of the subnets in the network zone you created (to verify it works), and then from a client system that uses a private IP that is not in any of the subnets in the network zone (to verify it fails and times out).
If you find that the behavior is not what you expect, check if there are other CBR rules for the containers-kubernetes
service that might apply to your cluster, as these might be affecting cluster access as well.
Step 6: Adding or removing subnets that can access the cluster
Now that you are using a CBR rule to protect your cluster, you can modify the network zone to specify which subnets can access your cluster.
Modifying your network zone from the console
-
Navigate to your network zone in the CBR console.
-
Select your zone, then click the List of actions and click Edit.
-
Add or remove subnets, VPCs, or services to your network zone to control which resources can access the chosen clusters.
Modify your network zone from the CLI
To add subnets that can access your cluster, you can use the cbr zone-update
command.
ibmcloud cbr zone-update <NETWORK-ZONE-ID> --name <NETWORK-ZONE-NAME> --addresses <EXISTING-SUBNETS>,<NEW-SUBNETS>
Looking at the example for the network zone that was created earlier for all clusters in the account with the two subnets 10.30.50.0/24
and 10.249.94.103/32
. An example command to add a third subnet, 10.10.10.0/24
,
would be as follows.
ibmcloud cbr zone-update <NETWORK-ZONE-ID> --name private-subnets-for-all-clusters --description "Private subnets that are allowed to access my clusters" --addresses 10.30.50.0/24,10.249.94.103/32,10.10.10.0/24
You must include all the existing entries in that network zone as well as the ones you want to add. The value you specify for --addresses
replaces the current address or subnet list in that network zone.
To remove subnets from the zone, you can use the same command and omit the subnets you want to remove from the --addresses
value. In this case, only include the subnets you still want to allow to access your clusters.
Removing context based restrictions from the private service endpoint
Deleting a rule from the console
-
Navigate to your rules in the CBR console.
-
Select your rule, then click the List of actions and click Remove.
-
Add or remove subnets, VPCs, or services to your network zone to control which resources can access your chosen clusters.
Deleting a rule from the CLI
You can delete CBR rules with the ibmcloud cbr rule-delete <RULE-ID>
or ibmcloud cbr rule-update <RULE-ID>
command.
To remove CBR protection completely from a cluster or all clusters, you must either delete or disable all CBR rules that affect your cluster.
If you use ibmcloud cbr rule-update
command to disable or enable an existing rule, you must specify all the attributes of the current rule in addition to the --enforcement-mode disabled
parameter, otherwise the attributes
you omit are removed from the rule.
Next steps
For more information about CBR, see the following links.
- [Protecting cluster resources with context-based restrictions]/docs/openshift?topic=openshift-cbr&interface=ui).
- Example context-based restrictions scenarios.
- CBR CLI reference.