SovereignCloudStack / standards

SCS standards in a machine readable format
https://scs.community/
Creative Commons Attribution Share Alike 4.0 International
34 stars 23 forks source link

Standardize k8s networking policies (CNI) #769

Open garloff opened 2 years ago

garloff commented 2 years ago

As SCS Managed Kubernetes Operator, I want to understand precisely which k8s networking policies I need to implement and which conformance tests I need to pass for compliance. As SCS user, I want to understand what networking policy support I can rely on when automating my container workload deployment/management.

(This belongs to Epic https://github.com/SovereignCloudStack/standards/issues/615.)

This story involves:

Definition of Ready:

Definition of Done:

garloff commented 2 years ago

Kubernetes E2E tests do cover at least some of this.

NotTheEvilOne commented 1 year ago

Findings

Conclusion With only one port being available to set rules for and the need to allow all pods to accept incoming traffic at the given port for Cilium v1.14 it seems to be complicated to standardize rules with significant and useful impact. However the limitation of not supporting port ranges may change at v1.15. It should be reconsidered therefore at a future release.

[1] https://github.com/SovereignCloudStack/k8s-cluster-api-provider/pull/431 [2] https://docs.cilium.io/en/v1.14/network/kubernetes/policy/#networkpolicy-state [3] https://kubernetes.io/docs/concepts/services-networking/network-policies/#behavior-of-to-and-from-selectors [4] https://stackoverflow.com/questions/47327554/kubernetes-networkpolicy-allow-loadbalancer