Task
Create a new NetworkPolicy named
allow-port-from-namespace in the existing namespace fubar
Ensure that the new Network Policy allows Pods in namespace internah to connect to port 9280/tcp of Pods in namespace internah to fubar.
Further ensure that the new NetworkPolicy:
. does not allow access to Pods, which don’t listen on port 9200/tcp
. does not allow access from Pods, which are not in namespace internal
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
name: allow-port-from-namespace
namespace: fubar
spec:
podSelector:
matchLabels: {}
policyTypes:
- Ingress
- Egress
ingress:
- from:
- namespaceSelector:
matchLabels:
name: internah
ports:
- protocol: TCP
port: 9280
egress:
- to:
- namespaceSelector:
matchLabels:
name: internah
ports:
- protocol: TCP
port: 9200
OR
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
name: allow-port-from-namespace
namespace: fubar
spec:
podSelector:
matchLabels: {}
policyTypes:
- Ingress
ingress:
- from:
- namespaceSelector:
matchLabels:
name: internah
ports:
- protocol: TCP
port: 9280