Comments (3)
I agree this is more of a recommendation topic and not so much of a repo issue.
I recently gave a talk about Kubernetes multi-tenancy and here's what I recommended:
- when you create a namespace "foo", apply the
deny-all-ingress
to all pods in "foo" - then, only whitelist the stuff that needs access to pods in "foo"
- make sure you can automate (1) –for that we have "GKE Policy Management" feature.
from kubernetes-network-policy-recipes.
from kubernetes-network-policy-recipes.
@srampal Yeah this is a multitenancy discussion alright :) I'll close this issue.
I recommend you to:
- watch davidopp's multi-tenancy talk from kubecon eu
a. watch my talk I linked above (they're very similar) - participate in
wg-kubernetes-multitenancy
email list which is under Kubernetes Community efforts.
This repo isn't the right forum to ask/discuss this. Your question is way beyond network policies.
from kubernetes-network-policy-recipes.
Related Issues (20)
- Container -> Pod HOT 3
- Are there examples using egress? HOT 2
- example for - allow egress only to public addresses HOT 1
- Add a recipe with a named port
- Network Policy on Plain Vanilla 1.18.4. HOT 1
- Block all port except specified. HOT 1
- 2a and 5 seem to be duplicates of each other, but with different explanations -- should they be combined? HOT 2
- allowed port 5000 but only accept at 5001 HOT 2
- add networkpolicy subproject maintainers HOT 3
- 02a-allow-all-traffic-to-an-application document correction HOT 2
- Add a case for allowing traffic from namespace without labels , like using namespaceselector with matchExpressions or some other option HOT 1
- network policy not working as expected in DENY all traffic to an application HOT 10
- What about a selector for a PV when it needs to access NFS Pod HOT 2
- ALLOW traffic to an application from all namespaces - create deny-all ing policy HOT 1
- Clarify the meaning of the empty NetworkPolicyIngressRule? HOT 7
- --generator=run-pod/v1 is deprecated & removed in the latest versions - It should be removed HOT 2
- deny-traffic-from-other-namespaces not functioning as described HOT 3
- Adding more info for examples 7 and 14 HOT 1
- i have k8s cluster in offline mode and i applied NW policy to allow specifiec ip wxternal HOT 1
- i have k8s cluster in offline mode and i applied NW policy to allow specifiec ip external , now i need to allow my cluster to communicate with aws SES service what is the NW policy i can apply for it HOT 1
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from kubernetes-network-policy-recipes.