How to stop all external traffic and allow only inter pod network call within namespace using network policy?












2















I'm setting up a namespace in my kubernetes cluster to deny any outgoing network calls like http://company.com but to allow inter pod communication within my namespace like http://my-nginx where my-nginx is a kubernetes service pointing to my nginx pod.



How to achieve this using network policy. Below network policy helps in blocking all outgoing network calls



kind: NetworkPolicy
apiVersion: networking.k8s.io/v1
metadata:
name: deny-all-egress
namespace: sample
spec:
policyTypes:
- Egress
podSelector: {}


How to white list only the inter pod calls?










share|improve this question























  • Have you perused github.com/ahmetb/kubernetes-network-policy-recipes already?

    – Michael Hausenblas
    Jan 18 at 13:41











  • Thank you for pointing it out. This particular example works for me github.com/ahmetb/kubernetes-network-policy-recipes/blob/master/… but with the catch that if there is a host with port 53 then it will not stop the call, isn't it?

    – Pradeep
    Jan 18 at 17:33
















2















I'm setting up a namespace in my kubernetes cluster to deny any outgoing network calls like http://company.com but to allow inter pod communication within my namespace like http://my-nginx where my-nginx is a kubernetes service pointing to my nginx pod.



How to achieve this using network policy. Below network policy helps in blocking all outgoing network calls



kind: NetworkPolicy
apiVersion: networking.k8s.io/v1
metadata:
name: deny-all-egress
namespace: sample
spec:
policyTypes:
- Egress
podSelector: {}


How to white list only the inter pod calls?










share|improve this question























  • Have you perused github.com/ahmetb/kubernetes-network-policy-recipes already?

    – Michael Hausenblas
    Jan 18 at 13:41











  • Thank you for pointing it out. This particular example works for me github.com/ahmetb/kubernetes-network-policy-recipes/blob/master/… but with the catch that if there is a host with port 53 then it will not stop the call, isn't it?

    – Pradeep
    Jan 18 at 17:33














2












2








2








I'm setting up a namespace in my kubernetes cluster to deny any outgoing network calls like http://company.com but to allow inter pod communication within my namespace like http://my-nginx where my-nginx is a kubernetes service pointing to my nginx pod.



How to achieve this using network policy. Below network policy helps in blocking all outgoing network calls



kind: NetworkPolicy
apiVersion: networking.k8s.io/v1
metadata:
name: deny-all-egress
namespace: sample
spec:
policyTypes:
- Egress
podSelector: {}


How to white list only the inter pod calls?










share|improve this question














I'm setting up a namespace in my kubernetes cluster to deny any outgoing network calls like http://company.com but to allow inter pod communication within my namespace like http://my-nginx where my-nginx is a kubernetes service pointing to my nginx pod.



How to achieve this using network policy. Below network policy helps in blocking all outgoing network calls



kind: NetworkPolicy
apiVersion: networking.k8s.io/v1
metadata:
name: deny-all-egress
namespace: sample
spec:
policyTypes:
- Egress
podSelector: {}


How to white list only the inter pod calls?







kubernetes






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked Jan 18 at 13:36









PradeepPradeep

516




516













  • Have you perused github.com/ahmetb/kubernetes-network-policy-recipes already?

    – Michael Hausenblas
    Jan 18 at 13:41











  • Thank you for pointing it out. This particular example works for me github.com/ahmetb/kubernetes-network-policy-recipes/blob/master/… but with the catch that if there is a host with port 53 then it will not stop the call, isn't it?

    – Pradeep
    Jan 18 at 17:33



















  • Have you perused github.com/ahmetb/kubernetes-network-policy-recipes already?

    – Michael Hausenblas
    Jan 18 at 13:41











  • Thank you for pointing it out. This particular example works for me github.com/ahmetb/kubernetes-network-policy-recipes/blob/master/… but with the catch that if there is a host with port 53 then it will not stop the call, isn't it?

    – Pradeep
    Jan 18 at 17:33

















Have you perused github.com/ahmetb/kubernetes-network-policy-recipes already?

– Michael Hausenblas
Jan 18 at 13:41





Have you perused github.com/ahmetb/kubernetes-network-policy-recipes already?

– Michael Hausenblas
Jan 18 at 13:41













Thank you for pointing it out. This particular example works for me github.com/ahmetb/kubernetes-network-policy-recipes/blob/master/… but with the catch that if there is a host with port 53 then it will not stop the call, isn't it?

– Pradeep
Jan 18 at 17:33





Thank you for pointing it out. This particular example works for me github.com/ahmetb/kubernetes-network-policy-recipes/blob/master/… but with the catch that if there is a host with port 53 then it will not stop the call, isn't it?

– Pradeep
Jan 18 at 17:33












0






active

oldest

votes











Your Answer






StackExchange.ifUsing("editor", function () {
StackExchange.using("externalEditor", function () {
StackExchange.using("snippets", function () {
StackExchange.snippets.init();
});
});
}, "code-snippets");

StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "1"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});

function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});


}
});














draft saved

draft discarded


















StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f54255166%2fhow-to-stop-all-external-traffic-and-allow-only-inter-pod-network-call-within-na%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown

























0






active

oldest

votes








0






active

oldest

votes









active

oldest

votes






active

oldest

votes
















draft saved

draft discarded




















































Thanks for contributing an answer to Stack Overflow!


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f54255166%2fhow-to-stop-all-external-traffic-and-allow-only-inter-pod-network-call-within-na%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

Liquibase includeAll doesn't find base path

How to use setInterval in EJS file?

Petrus Granier-Deferre