Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Side effects of applying DNS network policy (all-pods-egress-allow-dns) #5

Open
sherwoodzern opened this issue Dec 29, 2024 · 0 comments

Comments

@sherwoodzern
Copy link

The side effect of applying the DNS policy goes beyond just the kubernetes.io accessibility. The frontend pods are still able to access the backend pods, since there is an existing policy. However, if the backends needed to access other pods then it would be denied, and on and on.

Given that the recommendation is to apply a DNS policy, is there a recommendation on how to best manage the number of policies that potentially could be required to allow/deny the ingress and egress. With only 2 services it's not difficult, but if there are hundreds of services this could be a NWP management nightmare?

Does Cilium / Tetragon provide a product that would allow me to run traffic through my application (testing) and based upon the flows it could capture the traffic flows and thus begin to create the network policies for me?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant