[usage] Add network policy to allow ingress from server #11236
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
Add a network policy for the usage component so that it accepts incoming gRPC connections from
server
(and no other components).Related Issue(s)
Part of #9036
How to test
default
namespace.Install a
grpc
client like evans orgrpcurl
into the container.Try to connect from the
ubuntu
pod to theusage
service:See that it fails.
ubuntu
pod:evans
command from inside the ubuntu container.This time the connection succeeds because the pod is labelled correctly for the network policy to allow ingress.
Release Notes
Werft options: