We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
the missingNetworkPolicy check is currently enforcing at least one ingress/egress rule.
for plain webservers i don't want to allow any egress rule, also we have jobs which only have egress traffic.
the check should only over the policyTypes as it's automatically denying traffic if no rules are defined.
policyTypes
use netpol like:
--- apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: name: webserver spec: podSelector: matchLabels: app: webserver policyTypes: - Ingress - Egress ingress: # Ingress - from: - namespaceSelector: matchLabels: kubernetes.io/metadata.name: ingress ports: - protocol: TCP port: 8000
9.6.0
No response
The text was updated successfully, but these errors were encountered:
No branches or pull requests
What happened?
the missingNetworkPolicy check is currently enforcing at least one ingress/egress rule.
for plain webservers i don't want to allow any egress rule, also we have jobs which only have egress traffic.
What did you expect to happen?
the check should only over the
policyTypes
as it's automatically denying traffic if no rules are defined.How can we reproduce this?
use netpol like:
Version
9.6.0
Search
Code of Conduct
Additional context
No response
The text was updated successfully, but these errors were encountered: