Global network set
A global network set resource (GlobalNetworkSet) represents an arbitrary set of IP subnetworks/CIDRs, allowing it to be matched by Calico Cloud policy. Network sets are useful for applying policy to traffic coming from (or going to) external, non-Calico Cloud, networks.
GlobalNetworkSets can also include domain names, whose effect is to allow egress traffic to those domain names, when the GlobalNetworkSet is matched by the destination selector of an egress rule with action Allow. Domain names have no effect in ingress rules, or in a rule whose action is not Allow.
Calico Cloud implements policy for domain names by learning the corresponding IPs from DNS, then programming rules to allow those IPs. This means that if multiple domain names A, B and C all map to the same IP, and there is domain-based policy to allow A, traffic to B and C will be allowed as well.
The metadata for each network set includes a set of labels. When Calico Cloud is calculating the set of
IPs that should match a source/destination selector within a
global network policy rule, or within a
network policy rule whose
global(), it includes
the CIDRs from any network sets that match the selector.
Since Calico Cloud matches packets based on their source/destination IP addresses,
Calico Cloud rules may not behave as expected if there is NAT between the Calico Cloud-enabled node and the
networks listed in a network set. For example, in Kubernetes, incoming traffic via a service IP is
typically SNATed by the kube-proxy before reaching the destination host so Calico Cloud's workload
policy will see the kube-proxy's host's IP as the source instead of the real source.
kubectl commands, the following case-insensitive aliases
may be used to specify the resource type on the CLI:
globalnetworksets.projectcalico.org and abbreviations such as
Global network set definition
|The name of this network set.
|Lower-case alphanumeric with optional
|A set of labels to apply to this endpoint.
|The IP networks/CIDRs to include in the set.
|Valid IPv4 or IPv6 CIDRs, for example "192.0.2.128/25"
|The list of domain names that belong to this set and are honored in egress allow rules only. Domain names specified here only work to allow egress traffic from the cluster to external destinations. They don't work to deny traffic to destinations specified by domain name, or to allow ingress traffic from sources specified by domain name.
|List of exact or wildcard domain names
Exact and wildcard domain names
When a configured domain name has no wildcard (
*), it matches exactly that domain name. For example:
With a single asterisk in any part of the domain name, it matches 1 or more path components at that position. For example:
www.ipv6.google.com, but not
www.apple.com, but not
www.google.io, and so on
update.secure.suite.mycompany.com, and so on
Not supported are:
- Multiple wildcards in the same domain, for example:
- Asterisks that are not the entire component, for example:
- More general wildcards, such as regular expressions