You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As a customer I wan't to have an option to restrict access to Gdata-VaaS service inside Kubernetes cluster.
Unfortunately I have noticed, that with current helm chart implementation network policies does not block anything. Ingress rules does not have From: field, and Egress rules on the other hand does not have To: fields.
I have tried to add custom networkPolicy outside of the Helm Chart, but there is no way how I can differentiate gateway and gdscan pods, because they have completely the same labels (usually app.kubernetes.io/instance is using for this purpose).
Could you maybe fix it? Good example how it could be done is actually in the Redis helm chart here.
Thank you in advance and best regards.
The text was updated successfully, but these errors were encountered:
Hi Team,
As a customer I wan't to have an option to restrict access to Gdata-VaaS service inside Kubernetes cluster.
Unfortunately I have noticed, that with current helm chart implementation network policies does not block anything. Ingress rules does not have
From:
field, and Egress rules on the other hand does not haveTo:
fields.I have tried to add custom networkPolicy outside of the Helm Chart, but there is no way how I can differentiate
gateway
andgdscan
pods, because they have completely the same labels (usuallyapp.kubernetes.io/instance
is using for this purpose).Could you maybe fix it? Good example how it could be done is actually in the Redis helm chart here.
Thank you in advance and best regards.
The text was updated successfully, but these errors were encountered: