Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Network Policies not applied in Kube-System ns #243

Open
chakravarthi2u opened this issue May 4, 2023 · 1 comment
Open

Network Policies not applied in Kube-System ns #243

chakravarthi2u opened this issue May 4, 2023 · 1 comment

Comments

@chakravarthi2u
Copy link

Hi All,

We are using calico network policy solution and except kube-system ns all other namespaces working fine controlling traffic according to network policies defined.

Right now, Kube-System ns allowing only all allow network policy and if we define any custom network policy, i am getting 502 bad gateway with [502][socket hang up][ECONNRESET] error.

Is there any restrictions IKS will apply on kube-system ns to not allow network policies?

@bradbehle
Copy link
Collaborator

I'm not sure of the context of this question. If it is related to IBM Cloud Kubernetes Service, I would not recommend applying your own policies to kube-system, since that namespace runs many pods (like Calico, coredns, ...) that are essential to the cluster to function properly. If you are going to apply policies specifically to kube-system, you would need to understand all the network connections that all the pods in that namespace require.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants