You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We are using calico network policy solution and except kube-system ns all other namespaces working fine controlling traffic according to network policies defined.
Right now, Kube-System ns allowing only all allow network policy and if we define any custom network policy, i am getting 502 bad gateway with [502][socket hang up][ECONNRESET] error.
Is there any restrictions IKS will apply on kube-system ns to not allow network policies?
The text was updated successfully, but these errors were encountered:
I'm not sure of the context of this question. If it is related to IBM Cloud Kubernetes Service, I would not recommend applying your own policies to kube-system, since that namespace runs many pods (like Calico, coredns, ...) that are essential to the cluster to function properly. If you are going to apply policies specifically to kube-system, you would need to understand all the network connections that all the pods in that namespace require.
Hi All,
We are using calico network policy solution and except
kube-system
ns all other namespaces working fine controlling traffic according to network policies defined.Right now, Kube-System ns allowing only all allow network policy and if we define any custom network policy, i am getting 502 bad gateway with [502][socket hang up][ECONNRESET] error.
Is there any restrictions IKS will apply on
kube-system
ns to not allow network policies?The text was updated successfully, but these errors were encountered: