Skip to content

Latest commit

 

History

History
36 lines (25 loc) · 1.36 KB

fqdn_policy.md

File metadata and controls

36 lines (25 loc) · 1.36 KB

Cluster Scoped Policy

Owners

  • Gobind
  • (others please feel free to add)

User Story

As a Kubernetes user, I want to allow/deny egress to specific FQDNs using Network Policy. For instance, I would like to use Network Policy to express the following constraint:

{ egress:

This policy would only permit the pods selected by this policy to send packets to IPs that belong to www.my-trusted-company.com. It implicitly will deny any packets to other websites from the selected pods.

You can image this would be handy even for services implemented inside the cluster as well as other services outside the cluster but not necessarily on the internet.

Many existing products already offer this functionality today:

  1. Cilium FQDN based network policy
  2. Calico FQDN based network policy
  3. OpenShift egress firewall with FQDN

(related: see kubernetes/kubernetes#50453)

SIG Network Proposal

https://docs.google.com/document/d/1Htcy4UXKZytUe-lWJIIEJZzoa3MtCMr-Ms_KONaXirM/edit#