Epic: Networking & Tenant Isolation #8

Open
opened 2026-03-29 23:17:33 +02:00 by claude · 0 comments
Owner

Overview

Network-level tenant isolation on shared infrastructure, plus future VPN connectivity for customer backend access.

Day 1: Namespace Isolation

  • K8s NetworkPolicies per tenant namespace
  • Default deny all ingress/egress between tenant namespaces
  • Allow: tenant namespace → shared PostgreSQL/OpenSearch (with authentication)
  • Allow: tenant namespace → public internet (for Camel app external connectivity)
  • Allow: SaaS platform namespace → all tenant namespaces (management access)
  • Allow: tenant's Camel apps → tenant's cameleer3-server (intra-namespace)

Day 1: External Connectivity

  • Customer Camel apps connect to external systems over public internet
  • TLS required for all external connections
  • Platform-managed secrets for connection credentials (see Secrets epic)

Future: VPN / Private Connectivity

  • VPN gateway per tenant for private network access
  • WireGuard or IPsec tunnels to customer infrastructure
  • Private DNS resolution for customer internal hostnames
  • Split tunneling (only customer-bound traffic through VPN)

Future: Dedicated Tier Networking

  • Dedicated clusters with custom CIDR ranges
  • VPC peering or direct connect options
  • Customer-managed firewall rules

Security

  • No cross-tenant network paths on shared infra
  • Regular NetworkPolicy audit
  • Egress filtering (optional, per-tier)
## Overview Network-level tenant isolation on shared infrastructure, plus future VPN connectivity for customer backend access. ## Day 1: Namespace Isolation - K8s NetworkPolicies per tenant namespace - Default deny all ingress/egress between tenant namespaces - Allow: tenant namespace → shared PostgreSQL/OpenSearch (with authentication) - Allow: tenant namespace → public internet (for Camel app external connectivity) - Allow: SaaS platform namespace → all tenant namespaces (management access) - Allow: tenant's Camel apps → tenant's cameleer3-server (intra-namespace) ## Day 1: External Connectivity - Customer Camel apps connect to external systems over public internet - TLS required for all external connections - Platform-managed secrets for connection credentials (see Secrets epic) ## Future: VPN / Private Connectivity - VPN gateway per tenant for private network access - WireGuard or IPsec tunnels to customer infrastructure - Private DNS resolution for customer internal hostnames - Split tunneling (only customer-bound traffic through VPN) ## Future: Dedicated Tier Networking - Dedicated clusters with custom CIDR ranges - VPC peering or direct connect options - Customer-managed firewall rules ## Security - No cross-tenant network paths on shared infra - Regular NetworkPolicy audit - Egress filtering (optional, per-tier)
claude added the epicnetworking labels 2026-03-29 23:18:02 +02:00
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: cameleer/cameleer-saas#8