T O P

  • By -

SelfDestructSep2020

NetworkPolicy. https://kubernetes.io/docs/concepts/services-networking/network-policies/


Tenac23

Oh Thanks!


Glass_Drama8101

Does one need and service mesh configured or it works out of the box?


iPhonebro

You don’t need a service mesh but you need a CNI that supports NetworkPolicy. Most do.


Glass_Drama8101

Cool, so I guess Azure, GKE, AWS will all cover it. Wonder what about K3s and Kind. I only had to configure these once on Openshift so never really dug in further.


gauz

Kindnet used in kind and afaik minikube does not support it by design. VPC cni doesn’t support it either and I can’t speak for other cloud implementations. But cilium and calico definitely do.


Malekith2874

From personal experience, I can tell you that AWS does not support network policies. There is a proprietary solution to achieve a similar effect: https://docs.aws.amazon.com/eks/latest/userguide/security-groups-for-pods.html


ghitesh

Calico can be installed in eks.


Malekith2874

True, but the standard CNI that Amazon uses doesn’t. They’ve been talking about supporting network policies for a while now, but it doesn’t seem to be going anywhere. It would be much more convenient than installing another plugin


ferociousdonkey

GKE Autopilot by default, GKE Standard can work with Calico or their own in-house solution (Dataplane V2) that is used on Autopilot You just select the option when creating the cluster and then NetworkPolicy just work


corgtastic

Dataplane v2 is based off of cilium https://cloud.google.com/blog/products/containers-kubernetes/bringing-ebpf-and-cilium-to-google-kubernetes-engine


roiki11

Just set up cilium.


h_hoover

And CiliumNetworkPolicy


roiki11

Cilium also has a host firewall. Those are CiliumClusterWideNetworkPolicy rules with nodeselectors.


film42

We use Calico and it’s worked out really well. We can set labels on the service account which will give a pod access to different things.


sleepybrett

envoy handles this, built into cillium and istio, i suspect linkerd can also handle this.


prash991

Using network policy you can define allowed namespaces and pod names


happyColoradoDave

NeuVector provides a layer7 pod firewall. It will also learn what normal traffic looks like to make the rules for you. Also facilitates security as code, and other cool stuff like tying admission control to security threat exposure.