-
Bug
-
Resolution: Not a Bug
-
Normal
-
None
-
4.8
-
Moderate
-
None
-
SDN Sprint 228, SDN Sprint 229
-
2
-
Rejected
-
False
-
Description of problem:
Allow egress network policy not working after denying all egress/ingress policy.
Version-Release number of selected component (if applicable):
How reproducible:
Create a network policy for denay all default: ~~~ apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: name: deny-by-egress namespace: test spec: podSelector: {} policyTypes: - Egress - Ingress ~~~ And then allow egress to the default namespace will not work. ~~~ apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: name: allow-egress-default namespace: test spec: egress: - to: - namespaceSelector: matchLabels: kubernetes.io/metadata.name: default policyTypes: - Egress ~~~
Steps to Reproduce:
1. 2. 3.
Actual results:
Expected results:
Additional info: