仅允许 calico 网络策略的集群内入口
我想为接口创建一个globalnetworkpolicy
。我使用 Calico HostendPoint
作为接口,并为 hostendpoint
定义 globalnetworkpolicy
。我想创建一个仅允许从集群内部进入的 globalnetworkpolicy
。 此处提供了示例。
集群内流量是来自 Pod 和节点的流量。 我有 podCIDR,因此我可以使用它来确保允许来自 pod 的流量。 如何根据上面的链接允许来自节点自己的 IPAddresses
的流量? 链接中提到的节点自己的IPaddresses
是什么?
I want to create a globalnetworkpolicy
for an interface. I am using Calico HostendPoint
for the interface and defining globalnetworkpolicy
for the hostendpoint
. I would like to create a globalnetworkpolicy
that allows only ingress from within the cluster. A sample is given here.
In-cluster traffic is the traffic from pods and from nodes.
I have the podCIDR
, so I can use that to ensure that traffic from pods are allowed.
How do I allow traffic from nodes' own IPAddresses
as per the link above?
What is the nodes' own IPaddresses
mentioned in the link?
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(1)
它基本上指的是 Kubernetes 节点 - 更准确地说是 节点资源,即当
calico/node
实例启动时创建。 Calico 自动检测每个节点的 IP 地址和子网,以及 AS 关联和隧道地址(IP-in-IP 或 VXLAN),它们列于 节点资源配置。It is basically referring to Kubernetes node - more precisely to node resource, which is created when a
calico/node
instance is started. Calico automatically detects each node’s IP address and subnet, and alongside with AS association and tunnel address (IP-in-IP or VXLAN), they are listed in node resource configuration.