Uploaded image for project: 'OpenShift Bugs'
  1. OpenShift Bugs
  2. OCPBUGS-767

Allow egress network policy not working with OVN

XMLWordPrintable

    • Moderate
    • None
    • SDN Sprint 228, SDN Sprint 229
    • 2
    • Rejected
    • False
    • Hide

      None

      Show
      None

      Description of problem:

      Allow egress network policy not working after denying all egress/ingress policy.
      

      Version-Release number of selected component (if applicable):

      
      

      How reproducible:

      Create a network policy for denay all default:
      ~~~
      apiVersion: networking.k8s.io/v1
      kind: NetworkPolicy
      metadata:
        name: deny-by-egress
        namespace: test
      spec:
        podSelector: {}
        policyTypes:
        - Egress
        - Ingress
      ~~~
      
      And then allow egress to the default namespace will not work.
      ~~~
      apiVersion: networking.k8s.io/v1
      kind: NetworkPolicy
      metadata:
        name: allow-egress-default
        namespace: test
      spec:
        egress:
          - to:
             - namespaceSelector:
                 matchLabels:
                   kubernetes.io/metadata.name: default
        policyTypes:
        - Egress
      ~~~
      
      

      Steps to Reproduce:

      1.
      2.
      3.
      

      Actual results:

      
      

      Expected results:

      
      

      Additional info:

      
      

              bpickard@redhat.com Ben Pickard
              rhn-support-bmehra Bobby Mehra
              Anurag Saxena Anurag Saxena
              Votes:
              0 Vote for this issue
              Watchers:
              4 Start watching this issue

                Created:
                Updated:
                Resolved: