Microsegmentation¶
Welkin uses NetworkPolicies in order to ensure that components can only communicate with each other if absolutely necessary. It does this by first using a policy that denies all communication and then using policies to open up the required communication paths.
Our Network Policies are created using a generic generator chart in which you define a set of rules and then a set of policies using those rules.
Take the Velero values as an example. Velero is configured to allow egress traffic to the Cluster DNS, the API server, and the object storage, and Ingress from Prometheus for metrics scraping, using commonly defined rules.
velero:
podSelectorLabels:
app.kubernetes.io/name: velero
name: velero
egress:
- rule: egress-rule-dns
- rule: egress-rule-apiserver
- rule: egress-rule-object-storage
ingress:
- rule: ingress-rule-prometheus
ports:
- tcp: 8085
Some of the rules in these Network Policies are configurable through the Apps configuration. The possible configuration keys are available in the schema.
The documentation below is automatically generated based on the Network Policy generator values.
Management Cluster Network Policies¶
Namespace: cert-manager¶
Policy: all-deny¶
Pod Selector: This policy applies to all pods in the namespace.
Ingress Rules (Incoming Traffic)¶
- DENY ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
- DENY ALL outgoing traffic.
Policy: cainjector¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/component: cainjector
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/9402 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
Policy: controller¶
Pod Selector: This policy applies to pods with the following labels:
app: cert-manager
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/9402 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
| 3 | Reference to: egress-rule-ingress |
Management Cluster subnet CIDR | TCP/443TCP/80 |
| 4 | egress-rule-letsencrypt Inline Rule |
Configurable IP Block |
TCP/443 |
| 5 | egress-rule-http01 Inline Rule |
Configurable IP Block |
TCP/443TCP/80 |
| 6 | egress-rule-dns01 Inline Rule |
Configurable IP Block |
TCP/53UDP/53 |
Policy: startupapicheck¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/component: startupapicheck
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
Policy: webhook¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/component: webhook
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-apiserver |
Management Cluster API Server CIDR | TCP/10250 |
| 2 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/9402 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
Namespace: dex¶
Policy: all-deny¶
Pod Selector: This policy applies to all pods in the namespace.
Ingress Rules (Incoming Traffic)¶
- DENY ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
- DENY ALL outgoing traffic.
Policy: allow-cert-manager-resolver¶
Pod Selector: This policy applies to pods with the following labels:
acme.cert-manager.io/http01-solver: true
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-ingress |
Management Cluster subnet CIDR | TCP/8089 |
Egress Rules (Outgoing Traffic)¶
- ALLOW ALL outgoing traffic.
Policy: dex¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/name: dex
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-ingress |
Management Cluster subnet CIDR | TCP/5556 |
| 2 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/5558 |
| 3 | ingress-rule-grafana Inline Rule |
Pods with labels:app.kubernetes.io/name=grafanain namespace: monitoring |
TCP/5556 |
| 4 | ingress-rule-opensearch Inline Rule |
Pods with labels:app.kubernetes.io/instance=opensearch-masterin namespace: opensearch-systemPods with labels: app.kubernetes.io/instance=opensearch-dashboardsin namespace: opensearch-system |
TCP/5556 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
| 3 | egress-rule-connectors Inline Rule |
Configurable IP Block |
TCP/443 |
Namespace: falco¶
Policy: all-deny¶
Pod Selector: This policy applies to all pods in the namespace.
Ingress Rules (Incoming Traffic)¶
- DENY ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
- DENY ALL outgoing traffic.
Policy: falco¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/name: falco
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/8765 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
| 3 | egress-rule-falco-sidekick Inline Rule |
Pods with labels:app.kubernetes.io/name=falcosidekick |
TCP/2801 |
| 4 | egress-rule-falco-plugins Inline Rule |
Configurable IP Block |
TCP/443 |
Policy: falco-sidekick¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/name: falcosidekick
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | ingress-rule-falco Inline Rule |
Pods with labels:app.kubernetes.io/name=falco |
TCP/2801 |
| 2 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/2801 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | egress-rule-alertmanager Inline Rule |
Pods with labels:app.kubernetes.io/instance=kube-prometheus-stack-alertmanagerin namespace: monitoring |
TCP/9093 |
Namespace: fluentd-system¶
Policy: aggregator¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/instance: fluentd-aggregator
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | fluentd-forwarder Inline Rule |
Pods with labels:app.kubernetes.io/instance=fluentd-forwarder |
TCP/24224 |
| 2 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/24231 |
| 3 | Reference to: ingress-rule-blackbox |
Pods with labels:app.kubernetes.io/name=prometheus-blackbox-exporterin namespace: monitoring |
TCP/9880 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-object-storage |
Object storage CIDR | TCP/443 |
Policy: all-deny¶
Pod Selector: This policy applies to all pods in the namespace.
Ingress Rules (Incoming Traffic)¶
- DENY ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
- DENY ALL outgoing traffic.
Policy: forwarder¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/instance: fluentd-forwarder
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/24231 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
| 2 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 3 | fluentd-aggregator Inline Rule |
Pods with labels:app.kubernetes.io/instance=fluentd-aggregator |
TCP/24224 |
Policy: log-manager¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/name: log-manager
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-object-storage |
Object storage CIDR | TCP/443 |
Namespace: gatekeeper-system¶
Policy: all-deny¶
Pod Selector: This policy applies to all pods in the namespace.
Ingress Rules (Incoming Traffic)¶
- DENY ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
- DENY ALL outgoing traffic.
Policy: audit-controller¶
Pod Selector: This policy applies to pods with the following labels:
control-plane: audit-controller
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/8888 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
Policy: controller-manager¶
Pod Selector: This policy applies to pods with the following labels:
control-plane: controller-manager
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/8888 |
| 2 | Reference to: ingress-rule-blackbox |
Pods with labels:app.kubernetes.io/name=prometheus-blackbox-exporterin namespace: monitoring |
TCP/9090 |
| 3 | Reference to: ingress-rule-apiserver |
Management Cluster API Server CIDR | TCP/8443 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
Policy: templates-wait¶
Pod Selector: This policy applies to pods with the following labels:
job-name: gatekeeper-templates-wait
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
Policy: update-crds-hook¶
Pod Selector: This policy applies to pods with the following labels:
job-name: gatekeeper-update-crds-hook
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
Policy: update-namespace-label¶
Pod Selector: This policy applies to pods with the following labels:
job-name: gatekeeper-update-namespace-label
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
Namespace: harbor¶
Policy: all-deny¶
Pod Selector: This policy applies to all pods in the namespace.
Ingress Rules (Incoming Traffic)¶
- DENY ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
- DENY ALL outgoing traffic.
Policy: allow-cert-manager-resolver¶
Pod Selector: This policy applies to pods with the following labels:
acme.cert-manager.io/http01-solver: true
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-ingress |
Management Cluster subnet CIDR | TCP/8089 |
Egress Rules (Outgoing Traffic)¶
- ALLOW ALL outgoing traffic.
Policy: backup¶
Pod Selector: This policy applies to pods with the following labels:
component: backup
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-harbor-database |
Pods with labels:component=database |
TCP/5432 |
| 3 | Reference to: egress-rule-object-storage |
Object storage CIDR | TCP/443 |
Policy: cert-manager-http01-solver¶
Pod Selector: This policy applies to pods with the following labels:
acme.cert-manager.io/http01-solver: true
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-ingress |
Management Cluster subnet CIDR | TCP/8089 |
Egress Rules (Outgoing Traffic)¶
- ALLOW ALL outgoing traffic.
Policy: cleanup¶
Pod Selector: This policy applies to pods with the following labels:
component: cleanup
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-object-storage |
Object storage CIDR | TCP/443 |
Policy: core¶
Pod Selector: This policy applies to pods with the following labels:
component: core
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/8001 |
| 2 | Reference to: ingress-rule-ingress |
Management Cluster subnet CIDR | TCP/8080 |
| 3 | ingress-http Inline Rule |
Pods with labels:component=exporterPods with labels: component=jobservicePods with labels: component=trivyPods with labels: job-name=init-harbor-job |
TCP/8080 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-ingress |
Management Cluster subnet CIDR | TCP/443TCP/8443 |
| 3 | Reference to: egress-rule-object-storage |
Object storage CIDR | TCP/443 |
| 4 | Reference to: egress-rule-harbor-portal |
Pods with labels:component=portal |
TCP/8080 |
| 5 | Reference to: egress-rule-harbor-registry |
Pods with labels:component=registry |
TCP/5000TCP/8080 |
| 6 | Reference to: egress-rule-harbor-redis |
Pods with labels:component=redis |
TCP/6379 |
| 7 | Reference to: egress-rule-harbor-database |
Pods with labels:component=database |
TCP/5432 |
| 8 | Reference to: egress-rule-harbor-trivy |
Pods with labels:component=trivy |
TCP/8080 |
| 9 | Reference to: egress-rule-harbor-jobservice |
Pods with labels:component=jobservice |
TCP/8080 |
| 10 | Reference to: egress-rule-harbor-external-registries |
Configurable IP Block |
TCP/443 |
Policy: database¶
Pod Selector: This policy applies to pods with the following labels:
component: database
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Inline Rule | Pods with labels:component=corePods with labels: component=jobservicePods with labels: component=registryPods with labels: component=exporterPods with labels: component=backup |
TCP/5432 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
Policy: exporter¶
Pod Selector: This policy applies to pods with the following labels:
component: exporter
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/8001 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-harbor-core |
Pods with labels:component=core |
TCP/8080 |
| 3 | Reference to: egress-rule-harbor-redis |
Pods with labels:component=redis |
TCP/6379 |
| 4 | Reference to: egress-rule-harbor-database |
Pods with labels:component=database |
TCP/5432 |
Policy: init¶
Pod Selector: This policy applies to pods with the following labels:
job-name: init-harbor-job
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-harbor-core |
Pods with labels:component=core |
TCP/8080 |
Policy: jobservice¶
Pod Selector: This policy applies to pods with the following labels:
component: jobservice
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/8001 |
| 2 | ingress-rule-harbor-core Inline Rule |
Pods with labels:component=core |
All ports |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-harbor-core |
Pods with labels:component=core |
TCP/8080 |
| 3 | Reference to: egress-rule-harbor-redis |
Pods with labels:component=redis |
TCP/6379 |
| 4 | Reference to: egress-rule-harbor-database |
Pods with labels:component=database |
TCP/5432 |
| 5 | Reference to: egress-rule-harbor-trivy |
Pods with labels:component=trivy |
TCP/8080 |
| 6 | Reference to: egress-rule-harbor-registry |
Pods with labels:component=registry |
TCP/5000TCP/8080 |
| 7 | Reference to: egress-rule-harbor-external-registries |
Configurable IP Block |
TCP/443 |
| 8 | Reference to: egress-rule-harbor-jobservice |
Pods with labels:component=jobservice |
TCP/8080 |
| 9 | Reference to: egress-rule-harbor-external-jobservice |
Configurable IP Block |
TCP/443 |
Policy: portal¶
Pod Selector: This policy applies to pods with the following labels:
component: portal
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Inline Rule | Pods with labels:component=core |
All ports |
| 2 | Reference to: ingress-rule-ingress |
Management Cluster subnet CIDR | TCP/8080 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
Policy: redis¶
Pod Selector: This policy applies to pods with the following labels:
component: redis
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Inline Rule | Pods with labels:component=corePods with labels: component=jobservicePods with labels: component=trivyPods with labels: component=registryPods with labels: component=exporter |
TCP/6379 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
Policy: registry¶
Pod Selector: This policy applies to pods with the following labels:
component: registry
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/8001 |
| 2 | Inline Rule | Pods with labels:component=corePods with labels: component=jobservice |
TCP/5000TCP/8080 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-object-storage |
Object storage CIDR | TCP/443 |
| 3 | Reference to: egress-rule-harbor-redis |
Pods with labels:component=redis |
TCP/6379 |
Policy: trivy¶
Pod Selector: This policy applies to pods with the following labels:
component: trivy
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Inline Rule | Pods with labels:component=corePods with labels: component=jobservice |
TCP/8080 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-harbor-core |
Pods with labels:component=core |
TCP/8080 |
| 3 | Reference to: egress-rule-harbor-redis |
Pods with labels:component=redis |
TCP/6379 |
| 4 | Reference to: egress-rule-harbor-external-trivy |
Configurable IP Block |
TCP/443 |
Namespace: ingress-nginx¶
Policy: all-deny¶
Pod Selector: This policy applies to all pods in the namespace.
Ingress Rules (Incoming Traffic)¶
- DENY ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
- DENY ALL outgoing traffic.
Policy: controller¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/component: controller
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-ingress-controller |
Management Cluster subnet CIDR | TCP/80TCP/443 |
| 2 | Reference to: ingress-rule-apiserver |
Management Cluster API Server CIDR | TCP/8443 |
| 3 | Reference to: ingress-rule-blackbox |
Pods with labels:app.kubernetes.io/name=prometheus-blackbox-exporterin namespace: monitoring |
TCP/80TCP/443TCP/8443 |
| 4 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/10254 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
| 3 | Reference to: egress-rule-ingress |
Management Cluster subnet CIDR | TCP/80TCP/443 |
| 4 | egress-rule-grafana Inline Rule |
Pods with labels:app.kubernetes.io/name=grafanain namespace: monitoring |
TCP/3000 |
| 5 | egress-rule-opensearch-dashboards Inline Rule |
Pods with labels:app.kubernetes.io/instance=opensearch-dashboardsin namespace: opensearch-system |
TCP/5601 |
| 6 | egress-rule-opensearch Inline Rule |
Pods with labels:app.kubernetes.io/component=opensearch-masterin namespace: opensearch-system |
TCP/9200 |
| 7 | egress-rule-harbor Inline Rule |
Pods with labels:component=corein namespace: harborPods with labels: component=portalin namespace: harbor |
TCP/8080 |
| 8 | egress-rule-dex Inline Rule |
Pods with labels:app.kubernetes.io/name=dexin namespace: dex |
TCP/5556 |
| 9 | egress-rule-thanos Inline Rule |
Pods with labels:app.kubernetes.io/component=receive-distributorin namespace: thanos |
TCP/10902TCP/19291 |
| 10 | egress-rule-default-backend Inline Rule |
Pods with labels:app.kubernetes.io/component=default-backend |
TCP/8080 |
| 11 | egress-rule-cert-manager Inline Rule |
Pods with labels:acme.cert-manager.io/http01-solver=true |
TCP/8089 |
Policy: default-backend¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/component: default-backend
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-ingress |
Management Cluster subnet CIDR | TCP/8080 |
Egress Rules (Outgoing Traffic)¶
- ALLOW ALL outgoing traffic.
Policy: webhook¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/component: admission-webhook
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
Namespace: kube-system¶
Policy: coredns¶
Pod Selector: This policy applies to pods with the following labels:
k8s-app: kube-dns
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | ingress-rule-dns Inline Rule |
Any source | TCP/53UDP/53 |
| 2 | ingress-rule-kube-dns Inline Rule |
Pods with labels:k8s-app=kube-dns |
All ports |
| 3 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/9153 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
| 3 | Reference to: egress-rule-nodes |
Management Cluster subnet CIDR | TCP/53UDP/53 |
| 4 | egress-rule-service-ip Inline Rule |
Configurable IP Block |
TCP/53UDP/53 |
| 5 | egress-rule-external-dns Inline Rule |
Configurable IP Block |
TCP/53UDP/53 |
Policy: dns-autoscaler¶
Pod Selector: This policy applies to pods with the following labels:
k8s-app: dns-autoscaler
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-apiserver |
Management Cluster API Server CIDR | TCP/8080 |
| 2 | Reference to: egress-rule-nodes |
Management Cluster subnet CIDR | TCP/8080 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
Policy: metrics-server¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/name: metrics-server
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-apiserver |
Management Cluster API Server CIDR | TCP/8443 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
| 3 | Reference to: egress-rule-nodes |
Management Cluster subnet CIDR | TCP/10250 |
Policy: snapshot-controller¶
Pod Selector: This policy applies to pods with the following labels:
app: snapshot-controller
Ingress Rules (Incoming Traffic)¶
- DENY ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
Namespace: monitoring¶
Policy: alertmanager¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/name: alertmanager
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-apiserver |
Management Cluster API Server CIDR | All ports |
| 2 | ingress-rule-alertmanager Inline Rule |
Pods with labels:app.kubernetes.io/name=alertmanager |
All ports |
| 3 | ingress-rule-alert-generators Inline Rule |
Pods with labels:app.kubernetes.io/name=falcosidekickin namespace: falcoPods with labels: app.kubernetes.io/name=prometheusin namespace: monitoringPods with labels: app.kubernetes.io/component=rulerin namespace: thanos |
TCP/9093TCP/8080 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | egress-rule-alertmanager Inline Rule |
Pods with labels:app.kubernetes.io/name=alertmanager |
All ports |
| 3 | egress-rule-alert-receivers Inline Rule |
Configurable IP Block |
TCP/443 |
Policy: all-deny¶
Pod Selector: This policy applies to all pods in the namespace.
Ingress Rules (Incoming Traffic)¶
- DENY ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
- DENY ALL outgoing traffic.
Policy: allow-cert-manager-resolver¶
Pod Selector: This policy applies to pods with the following labels:
acme.cert-manager.io/http01-solver: true
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-ingress |
Management Cluster subnet CIDR | TCP/8089 |
Egress Rules (Outgoing Traffic)¶
- ALLOW ALL outgoing traffic.
Policy: cert-manager-http01-solver¶
Pod Selector: This policy applies to pods with the following labels:
acme.cert-manager.io/http01-solver: true
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-ingress |
Management Cluster subnet CIDR | TCP/8089 |
Egress Rules (Outgoing Traffic)¶
- ALLOW ALL outgoing traffic.
Policy: grafana¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/name: grafana
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-ingress |
Management Cluster subnet CIDR | TCP/3000 |
| 2 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/3000 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
| 3 | egress-rule-prometheus Inline Rule |
Pods with labels:app.kubernetes.io/name=prometheusPods with labels: app=grafana-label-enforcer |
TCP/9090 |
| 4 | egress-rule-thanos Inline Rule |
Pods with labels:app.kubernetes.io/component=query-frontendin namespace: thanos |
TCP/9090 |
| 5 | egress-rule-dex Inline Rule |
Pods with labels:app.kubernetes.io/name=dexin namespace: dex |
TCP/5556 |
| 6 | egress-rule-external-dashboards Inline Rule |
Configurable IP Block |
TCP/443 |
Policy: grafana-label-enforcer¶
Pod Selector: This policy applies to pods with the following labels:
app: grafana-label-enforcer
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | ingress-rule-grafana-datasource Inline Rule |
Pods with labels:app.kubernetes.io/name=grafana |
TCP/9090 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | egress-rule-thanos-query-frontend Inline Rule |
Pods with labels:app.kubernetes.io/component=query-frontendin namespace: thanos |
TCP/9090 |
Policy: kube-state-metrics¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/name: kube-state-metrics
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/8080TCP/8081 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
Policy: node-collector¶
Pod Selector: This policy applies to pods with the following labels:
app: node-collector
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
Policy: prometheus¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/name: prometheus
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-apiserver |
Management Cluster API Server CIDR | TCP/9090 |
| 2 | Reference to: ingress-rule-blackbox |
Pods with labels:app.kubernetes.io/name=prometheus-blackbox-exporterin namespace: monitoring |
TCP/9090 |
| 3 | ingress-rule-metrics-collection Inline Rule |
Pods with labels:app.kubernetes.io/name=prometheusPods with labels: app.kubernetes.io/name=grafana |
TCP/9090 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
| 3 | Reference to: egress-rule-nodes |
Management Cluster subnet CIDR | All ports |
| 4 | egress-rule-metrics-collection Inline Rule |
All ports |
Policy: prometheus-admission-create¶
Pod Selector: This policy applies to pods with the following labels:
app: kube-prometheus-stack-admission-create
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
Policy: prometheus-admission-patch¶
Pod Selector: This policy applies to pods with the following labels:
app: kube-prometheus-stack-admission-patch
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
Policy: prometheus-blackbox-exporter¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/instance: prometheus-blackbox-exporter
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/9115 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-nodes |
Management Cluster subnet CIDR | All ports |
| 3 | Reference to: egress-rule-ingress |
Management Cluster subnet CIDR | TCP/443TCP/8443 |
| 4 | Reference to: egress-rule-wc-ingress |
Workload Cluster Ingress CIDR | TCP/443TCP/8443 |
| 5 | egress-rule-probe Inline Rule |
All ports |
Policy: prometheus-crds-upgrade¶
Pod Selector: This policy applies to pods with the following labels:
job-name: prometheus-crds-upgrade
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
Policy: prometheus-node-exporter¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/name: prometheus-node-exporter
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/9010 |
Egress Rules (Outgoing Traffic)¶
- ALLOW ALL outgoing traffic.
Policy: prometheus-operator¶
Pod Selector: This policy applies to pods with the following labels:
app: kube-prometheus-stack-operator
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-apiserver |
Management Cluster API Server CIDR | TCP/10250 |
| 2 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/10250 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
Policy: trivy-operator¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/instance: trivy-operator
app.kubernetes.io/name: trivy-operator
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/8080 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
| 2 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 3 | Reference to: egress-rule-trivy |
Configurable IP Block |
TCP/443TCP/80 |
Policy: trivy-vulnerability-report-scanner¶
Pod Selector: This policy applies to pods with the following labels:
vulnerabilityReport.scanner: Trivy
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-trivy |
Configurable IP Block |
TCP/443TCP/80 |
Namespace: opensearch-system¶
Policy: all-deny¶
Pod Selector: This policy applies to all pods in the namespace.
Ingress Rules (Incoming Traffic)¶
- DENY ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
- DENY ALL outgoing traffic.
Policy: allow-cert-manager-resolver¶
Pod Selector: This policy applies to pods with the following labels:
acme.cert-manager.io/http01-solver: true
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-ingress |
Management Cluster subnet CIDR | TCP/8089 |
Egress Rules (Outgoing Traffic)¶
- ALLOW ALL outgoing traffic.
Policy: client¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/component: opensearch-client
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-egress-rule-opensearch |
Pods with labels:app.kubernetes.io/component=opensearch-masterPods with labels: app.kubernetes.io/component=opensearch-dataPods with labels: app.kubernetes.io/component=opensearch-client |
TCP/9300 |
| 2 | Reference to: ingress-rule-ingress |
Management Cluster subnet CIDR | TCP/9200 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-egress-rule-opensearch |
Pods with labels:app.kubernetes.io/component=opensearch-masterPods with labels: app.kubernetes.io/component=opensearch-dataPods with labels: app.kubernetes.io/component=opensearch-client |
TCP/9300 |
| 2 | Reference to: egress-rule-object-storage |
Object storage CIDR | TCP/443 |
| 3 | Reference to: egress-rule-plugins |
Configurable IP Block |
TCP/443 |
| 4 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
Policy: configurer¶
Pod Selector: This policy applies to pods with the following labels:
app: configurer
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dashboards |
Pods with labels:app.kubernetes.io/name=opensearch-dashboards |
TCP/5601 |
| 2 | Reference to: egress-rule-master |
Pods with labels:app.kubernetes.io/component=opensearch-master |
TCP/9200 |
| 3 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
Policy: curator¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/instance: opensearch-curator
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-master |
Pods with labels:app.kubernetes.io/component=opensearch-master |
TCP/9200 |
| 2 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
Policy: dashboard¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/name: opensearch-dashboards
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-ingress |
Management Cluster subnet CIDR | TCP/5601 |
| 2 | ingress-rule-configurer Inline Rule |
Pods with labels:app=configurer |
TCP/5601 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-master |
Pods with labels:app.kubernetes.io/component=opensearch-master |
TCP/9200 |
| 2 | Reference to: egress-rule-ingress |
Management Cluster subnet CIDR | TCP/443TCP/8443 |
| 3 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 4 | Reference to: egress-rule-dex |
Pods with labels:app.kubernetes.io/instance=dexapp.kubernetes.io/name=dex |
TCP/5556 |
Policy: data¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/component: opensearch-data
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-egress-rule-opensearch |
Pods with labels:app.kubernetes.io/component=opensearch-masterPods with labels: app.kubernetes.io/component=opensearch-dataPods with labels: app.kubernetes.io/component=opensearch-client |
TCP/9300 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-egress-rule-opensearch |
Pods with labels:app.kubernetes.io/component=opensearch-masterPods with labels: app.kubernetes.io/component=opensearch-dataPods with labels: app.kubernetes.io/component=opensearch-client |
TCP/9300 |
| 2 | Reference to: egress-rule-object-storage |
Object storage CIDR | TCP/443 |
| 3 | Reference to: egress-rule-plugins |
Configurable IP Block |
TCP/443 |
| 4 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
Policy: master¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/component: opensearch-master
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-egress-rule-opensearch |
Pods with labels:app.kubernetes.io/component=opensearch-masterPods with labels: app.kubernetes.io/component=opensearch-dataPods with labels: app.kubernetes.io/component=opensearch-client |
TCP/9300 |
| 2 | Reference to: ingress-rule-ingress |
Management Cluster subnet CIDR | TCP/9200 |
| 3 | ingress-rule-common-master Inline Rule |
Pods with labels:app.kubernetes.io/instance=opensearch-curatorPods with labels: app.kubernetes.io/name=opensearch-dashboardsPods with labels: app.kubernetes.io/name=prometheus-elasticsearch-exporterPods with labels: app=configurerPods with labels: app.kubernetes.io/instance=opensearch-securityadmin |
TCP/9200 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-egress-rule-opensearch |
Pods with labels:app.kubernetes.io/component=opensearch-masterPods with labels: app.kubernetes.io/component=opensearch-dataPods with labels: app.kubernetes.io/component=opensearch-client |
TCP/9300 |
| 2 | Reference to: egress-rule-object-storage |
Object storage CIDR | TCP/443 |
| 3 | Reference to: egress-rule-ingress |
Management Cluster subnet CIDR | TCP/443TCP/8443 |
| 4 | Reference to: egress-rule-plugins |
Configurable IP Block |
TCP/443 |
| 5 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 6 | Reference to: egress-rule-dex |
Pods with labels:app.kubernetes.io/instance=dexapp.kubernetes.io/name=dex |
TCP/5556 |
Policy: prometheus-exporter¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/name: prometheus-elasticsearch-exporter
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/9108 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-master |
Pods with labels:app.kubernetes.io/component=opensearch-master |
TCP/9200 |
| 2 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
Policy: security-admin¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/instance: opensearch-securityadmin
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-master |
Pods with labels:app.kubernetes.io/component=opensearch-master |
TCP/9200 |
| 2 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
Namespace: thanos¶
Policy: all-deny¶
Pod Selector: This policy applies to all pods in the namespace.
Ingress Rules (Incoming Traffic)¶
- DENY ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
- DENY ALL outgoing traffic.
Policy: allow-cert-manager-resolver¶
Pod Selector: This policy applies to pods with the following labels:
acme.cert-manager.io/http01-solver: true
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-ingress |
Management Cluster subnet CIDR | TCP/8089 |
Egress Rules (Outgoing Traffic)¶
- ALLOW ALL outgoing traffic.
Policy: cert-manager-http01-solver¶
Pod Selector: This policy applies to pods with the following labels:
acme.cert-manager.io/http01-solver: true
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-ingress |
Management Cluster subnet CIDR | TCP/8089 |
Egress Rules (Outgoing Traffic)¶
- ALLOW ALL outgoing traffic.
Policy: thanos-bucketweb¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/component: bucketweb
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/8080 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-object-storage |
Object storage CIDR | TCP/443 |
Policy: thanos-compactor¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/component: compactor
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/10902 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-object-storage |
Object storage CIDR | TCP/443 |
Policy: thanos-query¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/component: query
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-blackbox |
Pods with labels:app.kubernetes.io/name=prometheus-blackbox-exporterin namespace: monitoring |
TCP/10902 |
| 2 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/10902 |
| 3 | ingress-rule-query-api Inline Rule |
Pods with labels:app.kubernetes.io/component=query-frontendPods with labels: app.kubernetes.io/component=ruler |
TCP/10902 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | egress-rule-store-api Inline Rule |
Pods with labels:app.kubernetes.io/component=storegatewayPods with labels: app.kubernetes.io/component=receivePods with labels: app.kubernetes.io/component=ruler |
TCP/10901 |
Policy: thanos-query-frontend¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/component: query-frontend
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-apiserver |
Management Cluster API Server CIDR | TCP/9090 |
| 2 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/9090 |
| 3 | ingress-rule-grafana-datasource Inline Rule |
Pods with labels:app.kubernetes.io/name=grafanain namespace: monitoringPods with labels: app=grafana-label-enforcerin namespace: monitoring |
TCP/9090 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-query |
Pods with labels:app.kubernetes.io/component=query |
TCP/10902 |
Policy: thanos-receive¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/component: receive
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/10902 |
| 2 | Reference to: ingress-rule-query |
Pods with labels:app.kubernetes.io/component=query |
TCP/10901 |
| 3 | ingress-rule-receive-distributor Inline Rule |
Pods with labels:app.kubernetes.io/component=receive-distributor |
TCP/10901TCP/19391 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-object-storage |
Object storage CIDR | TCP/443 |
Policy: thanos-receive-distributor¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/component: receive-distributor
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-blackbox |
Pods with labels:app.kubernetes.io/name=prometheus-blackbox-exporterin namespace: monitoring |
TCP/10902 |
| 2 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/10902TCP/19291 |
| 3 | Reference to: ingress-rule-ingress |
Management Cluster subnet CIDR | TCP/19291 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | egress-rule-receive Inline Rule |
Pods with labels:app.kubernetes.io/component=receive |
TCP/10901TCP/19391 |
Policy: thanos-ruler¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/component: ruler
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/10902 |
| 2 | Reference to: ingress-rule-query |
Pods with labels:app.kubernetes.io/component=query |
TCP/10901 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-object-storage |
Object storage CIDR | TCP/443 |
| 3 | Reference to: egress-rule-query |
Pods with labels:app.kubernetes.io/component=query |
TCP/10902 |
| 4 | egress-rule-alertmanager Inline Rule |
Pods with labels:app.kubernetes.io/name=alertmanagerin namespace: monitoring |
TCP/9093 |
Policy: thanos-storegateway¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/component: storegateway
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/10902 |
| 2 | Reference to: ingress-rule-query |
Pods with labels:app.kubernetes.io/component=query |
TCP/10901 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-object-storage |
Object storage CIDR | TCP/443 |
Namespace: traefik-system¶
Policy: all-deny¶
Pod Selector: This policy applies to all pods in the namespace.
Ingress Rules (Incoming Traffic)¶
- DENY ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
- DENY ALL outgoing traffic.
Policy: traefik¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/name: traefik
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-ingress-controller |
Management Cluster subnet CIDR | TCP/8000TCP/8443 |
| 2 | Reference to: ingress-rule-apiserver |
Management Cluster API Server CIDR | TCP/8443 |
| 3 | Reference to: ingress-rule-blackbox |
Pods with labels:app.kubernetes.io/name=prometheus-blackbox-exporterin namespace: monitoring |
TCP/8000TCP/8443 |
| 4 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/9100 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
| 3 | Reference to: egress-rule-ingress |
Management Cluster subnet CIDR | TCP/8000TCP/8443 |
| 4 | egress-rule-grafana Inline Rule |
Pods with labels:app.kubernetes.io/name=grafanain namespace: monitoring |
TCP/3000 |
| 5 | egress-rule-opensearch-dashboards Inline Rule |
Pods with labels:app.kubernetes.io/instance=opensearch-dashboardsin namespace: opensearch-system |
TCP/5601 |
| 6 | egress-rule-opensearch Inline Rule |
Pods with labels:app.kubernetes.io/component=opensearch-masterin namespace: opensearch-system |
TCP/9200 |
| 7 | egress-rule-harbor Inline Rule |
Pods with labels:component=corein namespace: harborPods with labels: component=portalin namespace: harbor |
TCP/8080 |
| 8 | egress-rule-dex Inline Rule |
Pods with labels:app.kubernetes.io/name=dexin namespace: dex |
TCP/5556 |
| 9 | egress-rule-thanos Inline Rule |
Pods with labels:app.kubernetes.io/component=receive-distributorin namespace: thanos |
TCP/10902TCP/19291 |
| 10 | egress-rule-cert-manager Inline Rule |
Pods with labels:acme.cert-manager.io/http01-solver=truein namespace: `` |
TCP/8089 |
Namespace: velero¶
Policy: all-deny¶
Pod Selector: This policy applies to all pods in the namespace.
Ingress Rules (Incoming Traffic)¶
- DENY ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
- DENY ALL outgoing traffic.
Policy: velero¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/name: velero
name: velero
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/8085 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
| 3 | Reference to: egress-rule-object-storage |
Object storage CIDR | TCP/443 |
Policy: velero-data-mover¶
Pod Selector: This policy applies to pods with the following labels:
velero.io/exposer-pod-group: snapshot-exposer
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
| 3 | Reference to: egress-rule-object-storage |
Object storage CIDR | TCP/443 |
Policy: velero-maintenance-job¶
Pod Selector: This policy applies to all pods in the namespace.
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
| 3 | Reference to: egress-rule-object-storage |
Object storage CIDR | TCP/443 |
Policy: velero-node-agent¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/name: velero
name: node-agent
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
| 3 | Reference to: egress-rule-object-storage |
Object storage CIDR | TCP/443 |
Policy: velero-upgrade-crds¶
Pod Selector: This policy applies to pods with the following labels:
job-name: velero-upgrade-crds
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Management Cluster API Server CIDR | TCP/6443 |
Workload Cluster Network Policies¶
Namespace: alertmanager¶
Policy: alertmanager¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/name: alertmanager
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/9093 |
| 2 | ingress-rule-alertmanager Inline Rule |
Pods with labels:app.kubernetes.io/name=alertmanager |
All ports |
| 3 | ingress-rule-alert-generators Inline Rule |
Pods with labels:app.kubernetes.io/name=falcosidekickin namespace: falcoPods with labels: app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/9093 |
| 4 | ingress-rule-user-namespaces Inline Rule |
TCP/9093 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | egress-rule-alertmanager Inline Rule |
Pods with labels:app.kubernetes.io/name=alertmanager |
All ports |
| 3 | egress-rule-alert-receivers Inline Rule |
Configurable IP Block |
TCP/443 |
Policy: all-deny¶
Pod Selector: This policy applies to all pods in the namespace.
Ingress Rules (Incoming Traffic)¶
- DENY ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
- DENY ALL outgoing traffic.
Namespace: cert-manager¶
Policy: all-deny¶
Pod Selector: This policy applies to all pods in the namespace.
Ingress Rules (Incoming Traffic)¶
- DENY ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
- DENY ALL outgoing traffic.
Policy: cainjector¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/component: cainjector
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/9402 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
Policy: controller¶
Pod Selector: This policy applies to pods with the following labels:
app: cert-manager
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/9402 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
| 3 | Reference to: egress-rule-ingress |
Workload Cluster subnet CIDR | TCP/443TCP/80 |
| 4 | egress-rule-letsencrypt Inline Rule |
Configurable IP Block |
TCP/443 |
| 5 | egress-rule-http01 Inline Rule |
Configurable IP Block |
TCP/443TCP/80 |
| 6 | egress-rule-dns01 Inline Rule |
Configurable IP Block |
TCP/53UDP/53 |
Policy: startupapicheck¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/component: startupapicheck
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
Policy: webhook¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/component: webhook
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/10250 |
| 2 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/9402 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
Namespace: falco¶
Policy: all-deny¶
Pod Selector: This policy applies to all pods in the namespace.
Ingress Rules (Incoming Traffic)¶
- DENY ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
- DENY ALL outgoing traffic.
Policy: falco¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/name: falco
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/8765 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
| 3 | egress-rule-falco-sidekick Inline Rule |
Pods with labels:app.kubernetes.io/name=falcosidekick |
TCP/2801 |
| 4 | egress-rule-falco-plugins Inline Rule |
Configurable IP Block |
TCP/443 |
Policy: falco-sidekick¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/name: falcosidekick
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-blackbox |
Pods with labels:app.kubernetes.io/name=prometheus-blackbox-exporterin namespace: monitoring |
TCP/2801 |
| 2 | ingress-rule-falco Inline Rule |
Pods with labels:app.kubernetes.io/name=falco |
TCP/2801 |
| 3 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/2801 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | egress-rule-alertmanager Inline Rule |
Pods with labels:app.kubernetes.io/name=alertmanagerin namespace: alertmanager |
TCP/9093 |
Namespace: fluentd¶
Policy: all-deny¶
Pod Selector: This policy applies to all pods in the namespace.
Ingress Rules (Incoming Traffic)¶
- DENY ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
- DENY ALL outgoing traffic.
Policy: forwarder¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/name: fluentd-elasticsearch
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/24231 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
| 2 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 3 | Reference to: egress-rule-sc-ingress |
Management Cluster Ingress CIDR | TCP/443TCP/8443 |
| 4 | fluentd-aggregator Inline Rule |
Pods with labels:app.kubernetes.io/instance=fluentd-aggregatorin namespace: fluentd-system |
TCP/24224 |
Namespace: fluentd-system¶
Policy: aggregator¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/instance: fluentd-aggregator
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | fluentd-forwarder Inline Rule |
Pods with labels:app.kubernetes.io/instance=fluentd-forwarder |
TCP/24224 |
| 2 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/24231 |
| 3 | Reference to: ingress-rule-blackbox |
Pods with labels:app.kubernetes.io/name=prometheus-blackbox-exporterin namespace: monitoring |
TCP/9880 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-object-storage |
Object storage CIDR | TCP/443 |
Policy: aggregator-from-user¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/instance: fluentd-aggregator
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | fluentd-elasticsearch Inline Rule |
Pods with labels:app.kubernetes.io/name=fluentd-elasticsearchin namespace: fluentd |
TCP/24224 |
Egress Rules (Outgoing Traffic)¶
- ALLOW ALL outgoing traffic.
Policy: all-deny¶
Pod Selector: This policy applies to all pods in the namespace.
Ingress Rules (Incoming Traffic)¶
- DENY ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
- DENY ALL outgoing traffic.
Policy: forwarder¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/instance: fluentd-forwarder
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/24231 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
| 2 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 3 | fluentd-aggregator Inline Rule |
Pods with labels:app.kubernetes.io/instance=fluentd-aggregator |
TCP/24224 |
Policy: forwarder-to-opensearch¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/instance: fluentd-forwarder
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-sc-ingress |
Management Cluster Ingress CIDR | TCP/443TCP/8443 |
Namespace: gatekeeper-system¶
Policy: all-deny¶
Pod Selector: This policy applies to all pods in the namespace.
Ingress Rules (Incoming Traffic)¶
- DENY ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
- DENY ALL outgoing traffic.
Policy: audit-controller¶
Pod Selector: This policy applies to pods with the following labels:
control-plane: audit-controller
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/8888 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
Policy: controller-manager¶
Pod Selector: This policy applies to pods with the following labels:
control-plane: controller-manager
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/8888 |
| 2 | Reference to: ingress-rule-blackbox |
Pods with labels:app.kubernetes.io/name=prometheus-blackbox-exporterin namespace: monitoring |
TCP/9090 |
| 3 | Reference to: ingress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/8443 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
Policy: templates-wait¶
Pod Selector: This policy applies to pods with the following labels:
job-name: gatekeeper-templates-wait
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
Policy: update-crds-hook¶
Pod Selector: This policy applies to pods with the following labels:
job-name: gatekeeper-update-crds-hook
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
Policy: update-namespace-label¶
Pod Selector: This policy applies to pods with the following labels:
job-name: gatekeeper-update-namespace-label
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
Namespace: hnc-system¶
Policy: all-deny¶
Pod Selector: This policy applies to all pods in the namespace.
Ingress Rules (Incoming Traffic)¶
- DENY ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
- DENY ALL outgoing traffic.
Policy: controller-manager¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/component: hnc-controller-manager
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/8080 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
Policy: webhook¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/component: hnc-webhook
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/9443 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
Namespace: ingress-nginx¶
Policy: all-deny¶
Pod Selector: This policy applies to all pods in the namespace.
Ingress Rules (Incoming Traffic)¶
- DENY ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
- DENY ALL outgoing traffic.
Policy: cert-manager-http01-solver¶
Pod Selector: This policy applies to pods with the following labels:
acme.cert-manager.io/http01-solver: true
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-ingress |
Workload Cluster subnet CIDR | TCP/8089 |
Egress Rules (Outgoing Traffic)¶
- ALLOW ALL outgoing traffic.
Policy: controller¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/component: controller
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-ingress-controller |
Workload Cluster subnet CIDR | TCP/80TCP/443 |
| 2 | Reference to: ingress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/8443 |
| 3 | Reference to: ingress-rule-blackbox |
Pods with labels:app.kubernetes.io/name=prometheus-blackbox-exporterin namespace: monitoring |
TCP/80TCP/443TCP/8443 |
| 4 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/10254 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
| 3 | Reference to: egress-rule-ingress |
Workload Cluster subnet CIDR | TCP/80TCP/443 |
| 4 | Reference to: egress-rule-namespaces |
Any destination | All ports |
| 5 | egress-rule-kube-system-api Inline Rule |
Pods with labels:component=kube-apiserver |
TCP/3000 |
| 6 | egress-rule-default-backend Inline Rule |
Pods with labels:app.kubernetes.io/component=default-backend |
TCP/8080 |
| 7 | egress-rule-cert-manager Inline Rule |
Pods with labels:acme.cert-manager.io/http01-solver=truein namespace: `` |
TCP/8089 |
Policy: default-backend¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/component: default-backend
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-ingress |
Workload Cluster subnet CIDR | TCP/8080 |
Egress Rules (Outgoing Traffic)¶
- ALLOW ALL outgoing traffic.
Policy: webhook¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/component: admission-webhook
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
Namespace: kube-system¶
Policy: coredns¶
Pod Selector: This policy applies to pods with the following labels:
k8s-app: kube-dns
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | ingress-rule-dns Inline Rule |
Any source | TCP/53UDP/53 |
| 2 | ingress-rule-kube-dns Inline Rule |
Pods with labels:k8s-app=kube-dns |
All ports |
| 3 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/9153 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
| 3 | Reference to: egress-rule-nodes |
Workload Cluster subnet CIDR | TCP/53UDP/53 |
| 4 | egress-rule-service-ip Inline Rule |
Configurable IP Block |
TCP/53UDP/53 |
| 5 | egress-rule-external-dns Inline Rule |
Configurable IP Block |
TCP/53UDP/53 |
Policy: dns-autoscaler¶
Pod Selector: This policy applies to pods with the following labels:
k8s-app: dns-autoscaler
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/8080 |
| 2 | Reference to: egress-rule-nodes |
Workload Cluster subnet CIDR | TCP/8080 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
Policy: metrics-server¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/name: metrics-server
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/8443 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
| 3 | Reference to: egress-rule-nodes |
Workload Cluster subnet CIDR | TCP/10250 |
Policy: snapshot-controller¶
Pod Selector: This policy applies to pods with the following labels:
app: snapshot-controller
Ingress Rules (Incoming Traffic)¶
- DENY ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
Namespace: monitoring¶
Policy: all-deny¶
Pod Selector: This policy applies to all pods in the namespace.
Ingress Rules (Incoming Traffic)¶
- DENY ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
- DENY ALL outgoing traffic.
Policy: kube-state-metrics¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/name: kube-state-metrics
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/8080TCP/8081 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
Policy: node-collector¶
Pod Selector: This policy applies to pods with the following labels:
app: node-collector
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
Policy: prometheus¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/name: prometheus
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/9090 |
| 2 | Reference to: ingress-rule-blackbox |
Pods with labels:app.kubernetes.io/name=prometheus-blackbox-exporterin namespace: monitoring |
TCP/9090 |
| 3 | ingress-rule-metrics-collection Inline Rule |
Pods with labels:app.kubernetes.io/name=prometheus |
TCP/9090 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
| 3 | Reference to: egress-rule-nodes |
Workload Cluster subnet CIDR | All ports |
| 4 | Reference to: egress-rule-sc-ingress |
Management Cluster Ingress CIDR | TCP/443TCP/8443 |
| 5 | egress-rule-metrics-collection Inline Rule |
All ports |
Policy: prometheus-admission-create¶
Pod Selector: This policy applies to pods with the following labels:
app: kube-prometheus-stack-admission-create
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
Policy: prometheus-admission-patch¶
Pod Selector: This policy applies to pods with the following labels:
app: kube-prometheus-stack-admission-patch
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
Policy: prometheus-blackbox-exporter¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/instance: prometheus-blackbox-exporter
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/9115 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-nodes |
Workload Cluster subnet CIDR | All ports |
| 3 | Reference to: egress-rule-ingress |
Workload Cluster subnet CIDR | TCP/443TCP/8443 |
| 4 | Reference to: egress-rule-sc-ingress |
Management Cluster Ingress CIDR | TCP/443TCP/8443 |
| 5 | egress-rule-probe Inline Rule |
All ports |
Policy: prometheus-crds-upgrade¶
Pod Selector: This policy applies to pods with the following labels:
job-name: prometheus-crds-upgrade
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
Policy: prometheus-node-exporter¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/name: prometheus-node-exporter
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/9010 |
Egress Rules (Outgoing Traffic)¶
- ALLOW ALL outgoing traffic.
Policy: prometheus-operator¶
Pod Selector: This policy applies to pods with the following labels:
app: kube-prometheus-stack-operator
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/10250 |
| 2 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/10250 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
Policy: trivy-operator¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/instance: trivy-operator
app.kubernetes.io/name: trivy-operator
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/8080 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
| 2 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 3 | Reference to: egress-rule-trivy |
Configurable IP Block |
TCP/443TCP/80 |
Policy: trivy-vulnerability-report-scanner¶
Pod Selector: This policy applies to pods with the following labels:
vulnerabilityReport.scanner: Trivy
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-trivy |
Configurable IP Block |
TCP/443TCP/80 |
Namespace: production¶
Policy: allow-cert-manager-resolver¶
Pod Selector: This policy applies to pods with the following labels:
acme.cert-manager.io/http01-solver: true
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-ingress |
Workload Cluster subnet CIDR | TCP/8089 |
Egress Rules (Outgoing Traffic)¶
- ALLOW ALL outgoing traffic.
Namespace: set-me¶
Policy: allow-cert-manager-resolver¶
Pod Selector: This policy applies to pods with the following labels:
acme.cert-manager.io/http01-solver: true
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-ingress |
Workload Cluster subnet CIDR | TCP/8089 |
Egress Rules (Outgoing Traffic)¶
- ALLOW ALL outgoing traffic.
Namespace: staging¶
Policy: allow-cert-manager-resolver¶
Pod Selector: This policy applies to pods with the following labels:
acme.cert-manager.io/http01-solver: true
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-ingress |
Workload Cluster subnet CIDR | TCP/8089 |
Egress Rules (Outgoing Traffic)¶
- ALLOW ALL outgoing traffic.
Namespace: traefik-system¶
Policy: all-deny¶
Pod Selector: This policy applies to all pods in the namespace.
Ingress Rules (Incoming Traffic)¶
- DENY ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
- DENY ALL outgoing traffic.
Policy: traefik¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/name: traefik
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-ingress-controller |
Workload Cluster subnet CIDR | TCP/8000TCP/8443 |
| 2 | Reference to: ingress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/8443 |
| 3 | Reference to: ingress-rule-blackbox |
Pods with labels:app.kubernetes.io/name=prometheus-blackbox-exporterin namespace: monitoring |
TCP/8000TCP/8443 |
| 4 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/9100 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
| 3 | Reference to: egress-rule-ingress |
Workload Cluster subnet CIDR | TCP/8000TCP/8443 |
| 4 | Reference to: egress-rule-namespaces |
Any destination | All ports |
| 5 | egress-rule-kube-system-api Inline Rule |
Pods with labels:component=kube-apiserver |
TCP/3000 |
| 6 | egress-rule-cert-manager Inline Rule |
Pods with labels:acme.cert-manager.io/http01-solver=truein namespace: `` |
TCP/8089 |
Namespace: velero¶
Policy: all-deny¶
Pod Selector: This policy applies to all pods in the namespace.
Ingress Rules (Incoming Traffic)¶
- DENY ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
- DENY ALL outgoing traffic.
Policy: velero¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/name: velero
name: velero
Ingress Rules (Incoming Traffic)¶
| Rule | Description | From (Peers) | To (Ports) |
|---|---|---|---|
| 1 | Reference to: ingress-rule-prometheus |
Pods with labels:app.kubernetes.io/name=prometheusin namespace: monitoring |
TCP/8085 |
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
| 3 | Reference to: egress-rule-object-storage |
Object storage CIDR | TCP/443 |
Policy: velero-data-mover¶
Pod Selector: This policy applies to pods with the following labels:
velero.io/exposer-pod-group: snapshot-exposer
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
| 3 | Reference to: egress-rule-object-storage |
Object storage CIDR | TCP/443 |
Policy: velero-maintenance-job¶
Pod Selector: This policy applies to all pods in the namespace.
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
| 3 | Reference to: egress-rule-object-storage |
Object storage CIDR | TCP/443 |
Policy: velero-node-agent¶
Pod Selector: This policy applies to pods with the following labels:
app.kubernetes.io/name: velero
name: node-agent
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |
| 3 | Reference to: egress-rule-object-storage |
Object storage CIDR | TCP/443 |
Policy: velero-upgrade-crds¶
Pod Selector: This policy applies to pods with the following labels:
job-name: velero-upgrade-crds
Ingress Rules (Incoming Traffic)¶
- ALLOW ALL incoming traffic.
Egress Rules (Outgoing Traffic)¶
| Rule | Description | To (Peers) | On (Ports) |
|---|---|---|---|
| 1 | Reference to: egress-rule-dns |
Pods with labels:k8s-app=kube-dnsin namespace: kube-systemCluster DNS Service IP |
TCP/53UDP/53 |
| 2 | Reference to: egress-rule-apiserver |
Workload Cluster API Server CIDR | TCP/6443 |