Deploying test pods to K8S 🔗︎
kubectl run --generator=run-pod/v1 busybox1 --image=busybox -- sleep 3600
kubectl run --generator=run-pod/v1 busybox2 --image=busybox -- sleep 3600
kubectl get pod -o wide
NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES
busybox1 1/1 Running 0 69s 10.20.160.6 ip-192-168-76-80.eu-west-1.compute.internal <none> <none>
busybox2 1/1 Running 0 51s 10.20.192.4 ip-192-168-76-114.eu-west-1.compute.internal <none> <none>
Weave 🔗︎
1. Create a deny-all
policy 🔗︎
cat << EOF | kubectl apply -f -
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
name: deny-all
namespace: default
spec:
podSelector: {}
policyTypes:
- Ingress
- Egress
EOF
kubectl exec -ti busybox2 -- ping -c3 10.20.160.6
PING 10.20.160.6 (10.20.160.6): 56 data bytes
--- 10.20.160.6 ping statistics ---
3 packets transmitted, 0 packets received, 100% packet loss
2. Create an allow-out-to-in
policy, and add labels to pods 🔗︎
cat << EOF | kubectl apply -f -
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
name: allow-out-to-in
namespace: default
spec:
podSelector: {}
ingress:
- from:
- podSelector:
matchLabels:
test: out
egress:
- to:
- podSelector:
matchLabels:
test: in
policyTypes:
- Ingress
- Egress
EOF
3. Set labels of busybox pods 🔗︎
kubectl label pod busybox1 test=in
kubectl label pod busybox2 test=out
kubectl exec -ti busybox2 -- ping -c3 10.20.160.6
PING 10.20.160.6 (10.20.160.6): 56 data bytes
64 bytes from 10.20.160.6: seq=0 ttl=64 time=0.710 ms
64 bytes from 10.20.160.6: seq=1 ttl=64 time=0.596 ms
64 bytes from 10.20.160.6: seq=2 ttl=64 time=0.637 ms
--- 10.20.160.6 ping statistics ---
3 packets transmitted, 3 packets received, 0% packet loss
round-trip min/avg/max = 0.596/0.647/0.710 ms
Calico 🔗︎
You can use Calico NetworkPolicy in addition to Kubernetes NetworkPolicy, or exclusively.
1. Create a standard deny-all
policy 🔗︎
With Calico you can define standard NetworkPolicy.
cat << EOF | kubectl apply -f -
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
name: deny-all
namespace: default
spec:
podSelector: {}
policyTypes:
- Ingress
- Egress
EOF
kubectl exec -ti busybox2 -- ping -c3 192.168.67.136
PING 192.168.67.136 (192.168.67.136): 56 data bytes
--- 192.168.67.136 ping statistics ---
3 packets transmitted, 0 packets received, 100% packet loss
2. Create an allow-ingress-from-out
policy in a namespace 🔗︎
Now we can use Project Calico NetworkPolicy to allow some traffic overriding standard deny-all
NetworkPolicy.
cat << EOF | kubectl apply -f -
apiVersion: crd.projectcalico.org/v1
kind: NetworkPolicy
metadata:
name: allow-ingress-from-out
spec:
ingress:
- action: allow
source:
selector: test == 'out'
EOF
3. Create an allow-egress-to-in
policy globally 🔗︎
Due to egress isn’t enabled in step 3 the ping doesn’t work yet. Now create GlobalNetworkPolicy enbling egress to specified labelled pods clusterwide.
cat << EOF | kubectl apply -f -
apiVersion: crd.projectcalico.org/v1
kind: GlobalNetworkPolicy
metadata:
name: allow-egress-to-in
spec:
egress:
- action: allow
destination:
selector: test == 'in'
EOF
kubectl exec -ti busybox2 -- ping -c3 192.168.67.136
PING 192.168.67.136 (192.168.67.136): 56 data bytes
64 bytes from 192.168.67.136: seq=0 ttl=254 time=0.068 ms
64 bytes from 192.168.67.136: seq=1 ttl=254 time=0.072 ms
64 bytes from 192.168.67.136: seq=2 ttl=254 time=0.075 ms
--- 192.168.67.136 ping statistics ---
2 packets transmitted, 2 packets received, 0% packet loss
round-trip min/avg/max = 0.068/0.070/0.072 ms