File tree Expand file tree Collapse file tree 1 file changed +2
-0
lines changed
content/en/docs/concepts/security Expand file tree Collapse file tree 1 file changed +2
-0
lines changed Original file line number Diff line number Diff line change @@ -218,6 +218,8 @@ In a multi-tenant environment where strict network isolation between tenants is
218
218
with a default policy that denies communication between pods is recommended with another rule that
219
219
allows all pods to query the DNS server for name resolution. With such a default policy in place,
220
220
you can begin adding more permissive rules that allow for communication within a namespace.
221
+ It is also recommended not to use empty label selector '{}' for namespaceSelector field in network policy definition,
222
+ in case traffic need to be allowed between namespaces.
221
223
This scheme can be further refined as required. Note that this only applies to pods within a single
222
224
control plane; pods that belong to different virtual control planes cannot talk to each other via
223
225
Kubernetes networking.
You can’t perform that action at this time.
0 commit comments