-
Bug
-
Resolution: Not a Bug
-
Normal
-
None
-
4.8
-
Quality / Stability / Reliability
-
False
-
-
None
-
Moderate
-
None
-
None
-
None
-
Rejected
-
SDN Sprint 228, SDN Sprint 229
-
2
-
None
-
None
-
None
-
None
-
None
-
None
-
None
Description of problem:
Allow egress network policy not working after denying all egress/ingress policy.
Version-Release number of selected component (if applicable):
How reproducible:
Create a network policy for denay all default:
~~~
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
name: deny-by-egress
namespace: test
spec:
podSelector: {}
policyTypes:
- Egress
- Ingress
~~~
And then allow egress to the default namespace will not work.
~~~
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
name: allow-egress-default
namespace: test
spec:
egress:
- to:
- namespaceSelector:
matchLabels:
kubernetes.io/metadata.name: default
policyTypes:
- Egress
~~~
Steps to Reproduce:
1. 2. 3.
Actual results:
Expected results:
Additional info: