-
Notifications
You must be signed in to change notification settings - Fork 3.4k
Closed
Labels
area/k8sImpacts the kubernetes API, or kubernetes -> cilium internals translation layers.Impacts the kubernetes API, or kubernetes -> cilium internals translation layers.kind/community-reportThis was reported by a user in the Cilium community, eg via Slack.This was reported by a user in the Cilium community, eg via Slack.kind/featureThis introduces new functionality.This introduces new functionality.pinnedThese issues are not marked stale by our issue bot.These issues are not marked stale by our issue bot.sig/policyImpacts whether traffic is allowed or denied based on user-defined policies.Impacts whether traffic is allowed or denied based on user-defined policies.
Description
Proposal / RFE
Is your feature request related to a problem?
I'd like to restrict all pods in my Kubernetes cluster from accessing sensitive parts of the corporate network (CIDR ranges) without resorting to a hardware firewall.
Describe the solution you'd like
A cluster admin can define a set of rules that apply to all pod egress. NetworkPolicy/CiliumNetworkPolicy objects controlled by users could further restrict this.
Metadata
Metadata
Assignees
Labels
area/k8sImpacts the kubernetes API, or kubernetes -> cilium internals translation layers.Impacts the kubernetes API, or kubernetes -> cilium internals translation layers.kind/community-reportThis was reported by a user in the Cilium community, eg via Slack.This was reported by a user in the Cilium community, eg via Slack.kind/featureThis introduces new functionality.This introduces new functionality.pinnedThese issues are not marked stale by our issue bot.These issues are not marked stale by our issue bot.sig/policyImpacts whether traffic is allowed or denied based on user-defined policies.Impacts whether traffic is allowed or denied based on user-defined policies.