Skip to content

Commit

Permalink
Merge pull request #69 from sig-bsi-grundschutz/sys-1-6-A15
Browse files Browse the repository at this point in the history
PreProfile: Sys 1 6 a15
  • Loading branch information
sluetze authored Oct 28, 2024
2 parents 0ac8204 + 7b4f8b6 commit 1e23d86
Show file tree
Hide file tree
Showing 2 changed files with 65 additions and 5 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
documentation_complete: true

title: 'Limiting Network Bandwidth in Pods'

description: |-
Network bandwidth, SHOULD be appropriately reserved and limited.
rationale: |-
Network bandwidth is limited at the pod level and can be determined separately according
to incoming and outgoing network bandwidth.
For more information about limiting Pod bandwidth on OCP 4 please refer to the Red Hat documentation:
{{{ weblink(link="https://access.redhat.com/solutions/5018951") }}}
Out of the documetation use the example for the network bandwidth configuration of a pod:
<pre>
kind: Pod
apiVersion: v1
metadata:
name: hello-openshift
annotations:
kubernetes.io/ingress-bandwidth: 2M
kubernetes.io/egress-bandwidth: 1M
spec:
containers:
- image: openshift/hello-openshift
name: hello-openshift
</pre>
severity: unknown

identifiers:

references:

ocil_clause: 'Limiting Pod bandwidth on OCP 4'

ocil: |-
Extend pod configuration with bandwidth annotations.
32 changes: 27 additions & 5 deletions controls/bsi_sys_1_6.yml
Original file line number Diff line number Diff line change
Expand Up @@ -408,13 +408,35 @@ controls:
levels:
- standard
description: >-
Resources on the host system such as CPU, volatile and persistent memory, and network
bandwidth SHOULD be appropriately reserved and limited for each container. How the
(1) Resources on the host system such as CPU, volatile and persistent memory, and network
bandwidth SHOULD be appropriately reserved and limited for each container. (2) How the
system should react if these limits are exceeded SHOULD be defined and documented.
notes: >-
ToDo
status: manual
#rules:
Section 1: OpenShift supports the configuration of quotas for a project (client).
Applications can have their resources appropriately limited using limits/requests.
Network bandwidth is limited at the pod level and can be determined separately according
to incoming and outgoing network bandwidth. In addition, outgoing traffic (egress) can be
marked at the namespace level with differentiated services code point (DSCP) classifications
in order to assign quality of service classes to the outgoing packets in the physical network.
Section 2: This requirement must be implemented organizationally.
Note: The behavior of OpenShift completely replicates the standard behavior of Kubernetes.
If CPU limits are exceeded, the process is slowed down. If volatile memory is exceeded,
the process is stopped and restarted by the scheduler. The persistent memory management
is responsible for exceeding the persistent memory - OpenShift will not enforce or limit
anything here. Compliance with the limited network bandwidth is enforced by dropping
packets that exceed the limit.
status: automated
rules:
# Section 1
- project_config_and_template_resource_quota
- project_template_resource_quota
- resource_requests_limits_in_daemonset
- resource_requests_limits_in_deployment
- resource_requests_limits_in_statefulset
- resource_requests_quota
- resource_requests_quota_cluster
- resource_requests_quota_per_project
- configure_network_bandwidth

- id: SYS.1.6.A16
title: Administrative Remote Access to Containers
Expand Down

0 comments on commit 1e23d86

Please sign in to comment.