Network policy not working using pods label selector
Hello!
During ex 6.6 I am not able get my network policy to block all ingress and egress traffic using pod selector by label, after creation and re-creation of the deployment I am still able to access nginx web page when I expected to get any traffic denied. Any help is greatly appreciated:
kubectl describe networkpolicies netblock
Name: netblock
Namespace: default
Created on: 2020-04-28 01:26:37 +0000 UTC
Labels:
Annotations: kubectl.kubernetes.io/last-applied-configuration:
{"apiVersion":"networking.k8s.io/v1","kind":"NetworkPolicy","metadata":{"annotations":{},"name":"netblock","namespace":"default"},"spec":{...
Spec:
PodSelector: app=nserver
Allowing ingress traffic:
(Selected pods are isolated for ingress connectivity)
Allowing egress traffic:
(Selected pods are isolated for egress connectivity)
Policy Types: Ingress, Egress
network policy yaml:
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
name: netblock
namespace: default
spec:
podSelector:
matchLabels:
app: nserver
policyTypes:
- Ingress
- Egress
kubectl describe pod ndeploy-76dcd7ccd8-jmjp4 | grep Labels
Labels: app=nserver
kubectl describe pod ndeploy-76dcd7ccd8-jmjp4
Name: ndeploy-76dcd7ccd8-jmjp4
Namespace: default
Priority: 0
Node: kw1/10.1.10.31
Start Time: Tue, 28 Apr 2020 01:47:11 +0000
Labels: app=nserver
pod-template-hash=76dcd7ccd8
type=nserver
Annotations: cni.projectcalico.org/podIP: 192.168.159.115/32
Status: Running
IP: 192.168.159.115
IPs:
IP: 192.168.159.115
Controlled By: ReplicaSet/ndeploy-76dcd7ccd8
Containers:
nginx:
Container ID: docker://f4924d52f1e021a9304795ee0b9e4078cb4fee81f20a04cd74ec6a37b1be8262
Image: nginx:1.14.2
Image ID: docker-pullable://[email protected]:f7988fb6c02e0ce69257d9bd9cf37ae20a60f1df7563c3a2a6abe24160306b8d
Port: 80/TCP
Host Port: 0/TCP
State: Running
Started: Tue, 28 Apr 2020 01:47:13 +0000
Ready: True
Restart Count: 0
Environment:
Mounts:
/var/run/secrets/kubernetes.io/serviceaccount from default-token-zqbsw (ro)
Conditions:
Type Status
Initialized True
Ready True
ContainersReady True
PodScheduled True
Volumes:
default-token-zqbsw:
Type: Secret (a volume populated by a Secret)
SecretName: default-token-zqbsw
Optional: false
QoS Class: BestEffort
Node-Selectors:
Tolerations: node.kubernetes.io/not-ready:NoExecute for 300s
node.kubernetes.io/unreachable:NoExecute for 300s
Events:
Type Reason Age From Message
---- ------ ---- ---- -------
Normal Scheduled 7m5s default-scheduler Successfully assigned default/ndeploy-76dcd7ccd8-jmjp4 to kw1
Normal Pulled 7m4s kubelet, kw1 Container image "nginx:1.14.2" already present on machine
Normal Created 7m4s kubelet, kw1 Created container nginx
Stefan
Best Answer
-
Hi Stefan,
I would recommend reading up on the network policy documentation. In the introductory sections, you will find explained how the policy behaves once you introduce selectors. It may be the opposite of what you would expect
https://kubernetes.io/docs/concepts/services-networking/network-policies/
Regards,
-Chris5
Answers
-
Hi Stefan,
You can take a look at the default policy examples available in the official documentation:
https://kubernetes.io/docs/concepts/services-networking/network-policies/#default-policies
You may notice that default policies do not include any selectors.
Regards,
-Chris0 -
Chris,
I will be very thankful to learn how to use the NetworkPolicy spec.podselectors to filter pods for which a network policy applies for.Stefan
0 -
Thank you very much Chris, I read the third time and I realized that my new policy was only adding to the one previously created; I deleted the old one and now the new policy is working for my selected pods as expected.
Stefan
0
Categories
- 8.9K All Categories
- 13 LFX Mentorship
- 66 LFX Mentorship: Linux Kernel
- 363 Linux Foundation Boot Camps
- 231 Cloud Engineer Boot Camp
- 70 Advanced Cloud Engineer Boot Camp
- 25 DevOps Engineer Boot Camp
- 4 Cloud Native Developer Boot Camp
- 865 Training Courses
- 15 LFC110 Class Forum
- 16 LFD102 Class Forum
- 102 LFD103 Class Forum
- 3 LFD121 Class Forum
- 55 LFD201 Class Forum
- 1 LFD213 Class Forum - Discontinued
- 128 LFD232 Class Forum
- 19 LFD254 Class Forum
- 434 LFD259 Class Forum
- 86 LFD272 Class Forum
- 1 LFD272-JP クラス フォーラム
- 16 LFS200 Class Forum
- 695 LFS201 Class Forum
- LFS201-JP クラス フォーラム
- 271 LFS211 Class Forum
- 50 LFS216 Class Forum
- 26 LFS241 Class Forum
- 28 LFS242 Class Forum
- 19 LFS243 Class Forum
- 6 LFS244 Class Forum
- 9 LFS250 Class Forum
- LFS250-JP クラス フォーラム
- 109 LFS253 Class Forum
- 794 LFS258 Class Forum
- 7 LFS258-JP クラス フォーラム
- 51 LFS260 Class Forum
- 79 LFS261 Class Forum
- 14 LFS262 Class Forum
- 76 LFS263 Class Forum
- 14 LFS264 Class Forum
- 10 LFS266 Class Forum
- 8 LFS267 Class Forum
- 9 LFS268 Class Forum
- 6 LFS269 Class Forum
- 181 LFS272 Class Forum
- 1 LFS272-JP クラス フォーラム
- 188 LFW211 Class Forum
- 104 LFW212 Class Forum
- 879 Hardware
- 207 Drivers
- 74 I/O Devices
- 43 Monitors
- 115 Multimedia
- 205 Networking
- 98 Printers & Scanners
- 82 Storage
- 724 Linux Distributions
- 82 Debian
- 64 Fedora
- 12 Linux Mint
- 13 Mageia
- 22 openSUSE
- 126 Red Hat Enterprise
- 33 Slackware
- 13 SUSE Enterprise
- 347 Ubuntu
- 448 Linux System Administration
- 33 Cloud Computing
- 64 Command Line/Scripting
- Github systems admin projects
- 89 Linux Security
- 74 Network Management
- 105 System Management
- 45 Web Management
- 50 Mobile Computing
- 18 Android
- 19 Development
- 1.2K New to Linux
- 1.1K Getting Started with Linux
- 500 Off Topic
- 120 Introductions
- 193 Small Talk
- 19 Study Material
- 749 Programming and Development
- 241 Kernel Development
- 474 Software Development
- 902 Software
- 247 Applications
- 178 Command Line
- 2 Compiling/Installing
- 72 Games
- 314 Installation
- 20 All In Program
- 20 All In Forum
Upcoming Training
-
August 20, 2018
Kubernetes Administration (LFS458)
-
August 20, 2018
Linux System Administration (LFS301)
-
August 27, 2018
Open Source Virtualization (LFS462)
-
August 27, 2018
Linux Kernel Debugging and Security (LFD440)