I have a tool that uses nmap
to run a basic port scan on a host to check for open ports. It's setup in a docker container and on my local machine, works perfectly (shows the expected ports being open, etc.).
When I deploy this container to a Kubernetes cluster in Google Cloud and trigger the scan, I noticed the ports always show up as filtered.
I know that all 1,000 ports showing up as filtered generally means there's a firewall rule somewhere that's causing packets to drop, but I can't figure out where it is.
Our infrastructure setup is:
Here's what I've tried (didn't work):
egress
firewall rule in GCP to allow everything (all ports, protocols) on all my instancesIs there anything I can do to help further debug this or figure out where the firewall rules might be applied?
Thanks for your help.