Skip to content
This repository has been archived by the owner on Feb 1, 2021. It is now read-only.

Disable public IP access by default #61

Open
ogrisel opened this issue Jan 18, 2018 · 3 comments
Open

Disable public IP access by default #61

ogrisel opened this issue Jan 18, 2018 · 3 comments

Comments

@ogrisel
Copy link
Contributor

ogrisel commented Jan 18, 2018

For security reasons, I think that the default configuration should not map the jupyter / scheduler services on a public IP address (even if jupyter notebook asks for a password, passing a password over HTTP without TLS is unsafe).

It would be better to advertise the use of:

kubectl port-forward name-of-service localport:serviceport

We could even have some dask-kubernetes helper commands to do that automatically and open the notebook and other HTTP status pages on http://localhost:localport instead.

@ogrisel ogrisel changed the title Disable public access by default Disable public IP access by default Jan 18, 2018
@ogrisel
Copy link
Contributor Author

ogrisel commented Jan 18, 2018

@martindurant
Copy link
Member

A pretty common use case has been for sharing to share the scheduler or notebook - which would not work well with port forwarding/proxy.
(proxying is already used for the dashboard command)
It would be relatively easy to make the service creation optional and provide forward/proxy options - it would take a little effort, and complicate the CLI, perhaps.

Are you aware of the more recent and parallel daskernetes effort, and general chartification conversations?

@ogrisel
Copy link
Contributor Author

ogrisel commented Jan 18, 2018

@mrocklin just told me about daskernetes. I will have a look at it in the coming days.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

2 participants