Network policy not working using pods label selector
Hello!
During ex 6.6 I am not able get my network policy to block all ingress and egress traffic using pod selector by label, after creation and re-creation of the deployment I am still able to access nginx web page when I expected to get any traffic denied. Any help is greatly appreciated:
kubectl describe networkpolicies netblock
Name: netblock
Namespace: default
Created on: 2020-04-28 01:26:37 +0000 UTC
Labels:
Annotations: kubectl.kubernetes.io/last-applied-configuration:
{"apiVersion":"networking.k8s.io/v1","kind":"NetworkPolicy","metadata":{"annotations":{},"name":"netblock","namespace":"default"},"spec":{...
Spec:
PodSelector: app=nserver
Allowing ingress traffic:
(Selected pods are isolated for ingress connectivity)
Allowing egress traffic:
(Selected pods are isolated for egress connectivity)
Policy Types: Ingress, Egress
network policy yaml:
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
name: netblock
namespace: default
spec:
podSelector:
matchLabels:
app: nserver
policyTypes:
- Ingress
- Egress
kubectl describe pod ndeploy-76dcd7ccd8-jmjp4 | grep Labels
Labels: app=nserver
kubectl describe pod ndeploy-76dcd7ccd8-jmjp4
Name: ndeploy-76dcd7ccd8-jmjp4
Namespace: default
Priority: 0
Node: kw1/10.1.10.31
Start Time: Tue, 28 Apr 2020 01:47:11 +0000
Labels: app=nserver
pod-template-hash=76dcd7ccd8
type=nserver
Annotations: cni.projectcalico.org/podIP: 192.168.159.115/32
Status: Running
IP: 192.168.159.115
IPs:
IP: 192.168.159.115
Controlled By: ReplicaSet/ndeploy-76dcd7ccd8
Containers:
nginx:
Container ID: docker://f4924d52f1e021a9304795ee0b9e4078cb4fee81f20a04cd74ec6a37b1be8262
Image: nginx:1.14.2
Image ID: docker-pullable://[email protected]:f7988fb6c02e0ce69257d9bd9cf37ae20a60f1df7563c3a2a6abe24160306b8d
Port: 80/TCP
Host Port: 0/TCP
State: Running
Started: Tue, 28 Apr 2020 01:47:13 +0000
Ready: True
Restart Count: 0
Environment:
Mounts:
/var/run/secrets/kubernetes.io/serviceaccount from default-token-zqbsw (ro)
Conditions:
Type Status
Initialized True
Ready True
ContainersReady True
PodScheduled True
Volumes:
default-token-zqbsw:
Type: Secret (a volume populated by a Secret)
SecretName: default-token-zqbsw
Optional: false
QoS Class: BestEffort
Node-Selectors:
Tolerations: node.kubernetes.io/not-ready:NoExecute for 300s
node.kubernetes.io/unreachable:NoExecute for 300s
Events:
Type Reason Age From Message
---- ------ ---- ---- -------
Normal Scheduled 7m5s default-scheduler Successfully assigned default/ndeploy-76dcd7ccd8-jmjp4 to kw1
Normal Pulled 7m4s kubelet, kw1 Container image "nginx:1.14.2" already present on machine
Normal Created 7m4s kubelet, kw1 Created container nginx
Stefan
Best Answer
-
Hi Stefan,
I would recommend reading up on the network policy documentation. In the introductory sections, you will find explained how the policy behaves once you introduce selectors. It may be the opposite of what you would expect
https://kubernetes.io/docs/concepts/services-networking/network-policies/
Regards,
-Chris5
Answers
-
Hi Stefan,
You can take a look at the default policy examples available in the official documentation:
https://kubernetes.io/docs/concepts/services-networking/network-policies/#default-policies
You may notice that default policies do not include any selectors.
Regards,
-Chris0 -
Chris,
I will be very thankful to learn how to use the NetworkPolicy spec.podselectors to filter pods for which a network policy applies for.Stefan
0 -
Thank you very much Chris, I read the third time and I realized that my new policy was only adding to the one previously created; I deleted the old one and now the new policy is working for my selected pods as expected.
Stefan
0
Categories
- 9.1K All Categories
- 15 LFX Mentorship
- 68 LFX Mentorship: Linux Kernel
- 380 Linux Foundation Boot Camps
- 233 Cloud Engineer Boot Camp
- 75 Advanced Cloud Engineer Boot Camp
- 30 DevOps Engineer Boot Camp
- 9 Cloud Native Developer Boot Camp
- 974 Training Courses
- 15 LFC110 Class Forum
- 16 LFD102 Class Forum
- 106 LFD103 Class Forum
- 5 LFD121 Class Forum
- 56 LFD201 Class Forum
- 1 LFD213 Class Forum - Discontinued
- 128 LFD232 Class Forum
- 19 LFD254 Class Forum
- 450 LFD259 Class Forum
- 90 LFD272 Class Forum
- 1 LFD272-JP クラス フォーラム
- 16 LFS200 Class Forum
- 712 LFS201 Class Forum
- LFS201-JP クラス フォーラム
- 282 LFS211 Class Forum
- 50 LFS216 Class Forum
- 27 LFS241 Class Forum
- 28 LFS242 Class Forum
- 19 LFS243 Class Forum
- 6 LFS244 Class Forum
- 12 LFS250 Class Forum
- LFS250-JP クラス フォーラム
- 113 LFS253 Class Forum
- 813 LFS258 Class Forum
- 8 LFS258-JP クラス フォーラム
- 54 LFS260 Class Forum
- 81 LFS261 Class Forum
- 18 LFS262 Class Forum
- 76 LFS263 Class Forum
- 14 LFS264 Class Forum
- 10 LFS266 Class Forum
- 10 LFS267 Class Forum
- 9 LFS268 Class Forum
- 6 LFS269 Class Forum
- 182 LFS272 Class Forum
- 1 LFS272-JP クラス フォーラム
- 191 LFW211 Class Forum
- 114 LFW212 Class Forum
- 880 Hardware
- 207 Drivers
- 74 I/O Devices
- 44 Monitors
- 115 Multimedia
- 205 Networking
- 98 Printers & Scanners
- 82 Storage
- 730 Linux Distributions
- 85 Debian
- 64 Fedora
- 12 Linux Mint
- 13 Mageia
- 22 openSUSE
- 127 Red Hat Enterprise
- 33 Slackware
- 13 SUSE Enterprise
- 349 Ubuntu
- 450 Linux System Administration
- 33 Cloud Computing
- 64 Command Line/Scripting
- Github systems admin projects
- 89 Linux Security
- 76 Network Management
- 105 System Management
- 45 Web Management
- 51 Mobile Computing
- 19 Android
- 19 Development
- 1.2K New to Linux
- 1.1K Getting Started with Linux
- 501 Off Topic
- 121 Introductions
- 193 Small Talk
- 19 Study Material
- 756 Programming and Development
- 243 Kernel Development
- 479 Software Development
- 903 Software
- 247 Applications
- 178 Command Line
- 2 Compiling/Installing
- 73 Games
- 314 Installation
- 26 All In Program
- 26 All In Forum
Upcoming Training
-
August 20, 2018
Kubernetes Administration (LFS458)
-
August 20, 2018
Linux System Administration (LFS301)
-
August 27, 2018
Open Source Virtualization (LFS462)
-
August 27, 2018
Linux Kernel Debugging and Security (LFD440)