You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
While testing kube-iptables-tailer chart with calico I noticed that GlobalNetworkPolicy with a second action of "allow" for all protocols completely overrides already existing K8S network policies thus making Calico accept all the traffic. This seems to contradict the idea of the service as it is intended to generate events on iptables drop actions. Is it an intended behaviour?
The text was updated successfully, but these errors were encountered:
Hiya there,
Thanks for the greate chart collection.
While testing kube-iptables-tailer chart with calico I noticed that GlobalNetworkPolicy with a second action of "allow" for all protocols completely overrides already existing K8S network policies thus making Calico accept all the traffic. This seems to contradict the idea of the service as it is intended to generate events on iptables drop actions. Is it an intended behaviour?
The text was updated successfully, but these errors were encountered: