K8s-networkpolicy
Jump to navigation
Jump to search
#NAMESPACE NETWORK ISOLATION #Define namespace : export nameSpace= #Execute : cat <<EOT >~/networkpolicy.yaml kind: NetworkPolicy apiVersion: networking.k8s.io/v1 metadata: name: allow-same-namespace spec: podSelector: matchLabels: ingress: - from: - podSelector: {} --- apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: name: allow-from-ingress spec: ingress: - from: - namespaceSelector: matchLabels: kubernetes.io/metadata.name: ingress podSelector: {} policyTypes: - Ingress --- apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: name: allow-from-openshift-ingress spec: ingress: - from: - namespaceSelector: matchLabels: policy-group.network.openshift.io/ingress: "" podSelector: {} policyTypes: - Ingress --- apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: name: allow-from-openshift-monitoring spec: ingress: - from: - namespaceSelector: matchLabels: network.openshift.io/policy-group: monitoring podSelector: {} policyTypes: - Ingress EOT kubectl -n ${nameSpace} apply -f ~/networkpolicy.yaml