-
Feature Request
-
Resolution: Unresolved
-
Undefined
-
None
-
None
-
None
-
Product / Portfolio Work
-
None
-
False
-
-
None
-
None
-
None
-
-
None
-
None
-
None
-
None
-
None
1. Proposed title of this feature request
"Admin Network Policy for secondary-UDNs"
2. What is the nature and description of the request?
Customers using localnet (e.g. OpenShift Virtualization users) need a way to control access to networks in secondary UDNs in a way similar to AdminNetworkPolicy. This way they can allow certain resources to all pods, while denying access to others.
This could either be:
- Another new API like MNPs.
- Or a re-purposing existing ANP API to be multi-network aware.
3. Why does the customer need this? (List the business requirements here)
Customers need a way to layer access controls such that required common services from outside (such as LDAP and other services) are allowed while access to other services are denied. Further, the project owners need to be to add services specific to the project on top of the core ACLs defined by the administator in the context of secondary UDNs.
4. List any affected packages or components.
UDN