On 9/27/22 10:50, dmitri maziuk wrote:
On 2022-09-27 9:38 AM, Shawn Heisey wrote:
...  I can
envision a configuration for haproxy that uses URL path restriction plus IP address restriction for outside developers to be able to see what their code sees.

You could firewall port 8983 off at the perimeter and let the devs VPN (or `ssh -L8983:...`) into your intranet, too.

Nothing can get to port 8983 from outside the machine.  I used to use SSH port forwarding and connect my browser to localhost:8983 to access the Solr install in AWS.

As far as VPN, setting that up on AWS is a bit painful.  The https URL through haproxy is much cleaner, and in the event I need somebody to get to my Solr install, I just add their public IP to an ACL in haproxy, and they have access via https.  Remove the IP, and they don't have access.

For a business, a VPN would be a decent solution.  My way means I do not have to create anyone an account on any system, just add their public IP.  Which is a great option considering that this Solr install is purely for my personal email infrastructure. Haproxy has really good logging, so between that and Solr's logging, I have an audit trail if I need it.

Thanks,
Shawn

Reply via email to