Skip to main content
Version: 0.1.0

Diagram

OpenBao network perimeter

The workload path starts closed and only opens the traffic required for cluster management, Raft, ingress, and explicitly configured integrations.

Decision matrix

Network posture at a glance

Network posture at a glance.
SurfaceDefault postureWhat opens it up
Workload egressDenied by default except for core cluster dependenciesAPI server, DNS, Raft peer traffic, and explicitly configured integrations.
Backup and restore job egressSeparate from the main workload policyExplicit object-storage and identity reachability assumptions through job-level configuration.
Controller ingressRestricted to health and metrics surfacesMonitoring and kubelet probe paths only when operator network policies are enabled.

Workload traffic rules

Reference table

Allowed ingress paths

Allowed ingress paths.
SourceTypical portWhy it exists
Raft peers8201/TCPRequired for consensus, leader election, and replication between StatefulSet members.
Gateway or trusted ingress peer8200Allowed only when gateway integration or trusted ingress peers are configured deliberately.
Kube-system health pathsPlatform-dependentSome CNIs or DNS health checks require controlled access from system namespaces.

If you need additional ingress, use:

  • spec.network.ingressRules for additive peer rules
  • spec.network.trustedIngressPeers for user-managed ingress or passthrough proxies

Status checkpoints for network assumptions

When manifests alone do not explain the observed behavior, start with these conditions:

  • APIServerNetworkReady for API-server reachability assumptions
  • GatewayIntegrationReady for gateway listener and controller compatibility
  • BackupConfigurationReady for object-storage and backup auth reachability
  • RestoreConfigurationReady for restore job egress and identity assumptions

Controller network posture

Reference table

Controller networking

Controller networking.
SurfacePostureWhy
EgressPrimarily the Kubernetes API and essential control-plane services.Controller traffic should stay close to reconciliation and not behave like a general egress client.

Continue platform controls

Published release documentation

You are reading docs for version 0.1.0. Use the version menu to switch to next or another archived release.

Was this page helpful?

Use Needs work to open a structured GitHub issue for this page. The Yes button only acknowledges the signal locally.