Skip to content

GCP NCC, NGFW, Policy Based Routing, Hierarchical Firewall Policies and Armor integration #173

@obriensystems

Description

@obriensystems

20260323 Impl

20260317 Current Diagram

Image

Links

Previous Work

Requirements

R1 - Split PB Medium from PB Hight

R2 - Blast Radius environments in prod - split high attack apps out from the rest in PB High

R4 - NCC Hub split - 1 or more hub-spoke sets per env? check mesh vs start topology req.

R5 - DNS forwarding/peering from SC2G - GoogleCloudPlatform/pubsec-declarative-toolkit#468

R6 - Use Shared VPC for NCC spokes of main prod/nprod... host projects - https://docs.cloud.google.com/vpc/docs/provisioning-shared-vpc

R7 - Gateway API per tenant - with provisioned L4 LB

R8 - GKE pod to pod encryption via mTLS - envoy

R9 - SCTP in use https://docs.cloud.google.com/kubernetes-engine/docs/how-to/deploy-workloads-with-sctp

Constraints

C1 - NGFW bandwidth: are we ok with 2-10 Gbps throughput through the NGFW - adding NGFW to NCC will reduce the full VM to VM bandwidth across spokes (in mesh topology) with NCC only

C2 - NCC bandwidth

C3 - Peering limits - the 250 peering limit on NCC is up from the non-NCC limit of 25

C4 - go over lack of static route forwarding - but we have normal BGP dynamic route forwarding in NCC

C5 - NGFW does not do TLS inspection intranode for pods with the same affinity to a GKE node - https://docs.cloud.google.com/firewall/docs/about-firewalls#firewall-plus

use GKE Dataplane V2 - eBPF cilium - https://docs.cloud.google.com/kubernetes-engine/docs/concepts/dataplane-v2

Infrastructure as Code

NCC

Review

Design Issues

DI10: Can NGFW be part of NCC as a spoke

DI11: NCC Preset Topologies

DI12: Gateway API TLS passthrough - prototype https://gateway-api.sigs.k8s.io/guides/tls/#clientserver-and-tls

Metadata

Metadata

Assignees

Labels

No labels
No labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions