Kubernetes policy, demo
The included demo sets up a frontend and backend service, as well as a client service, all running on Kubernetes. It then configures network policy on each service.
Running the stars example
1) Create the frontend, backend, client, and management-ui apps.
kubectl create -f https://docs.tigera.io/files/00-namespace.yaml
kubectl create -f https://docs.tigera.io/files/01-management-ui.yaml
kubectl create -f https://docs.tigera.io/files/02-backend.yaml
kubectl create -f https://docs.tigera.io/files/03-frontend.yaml
kubectl create -f https://docs.tigera.io/files/04-client.yaml
Wait for all the pods to enter Running
state.
kubectl get pods --all-namespaces --watch
Note that it may take several minutes to download the necessary Docker images for this demo.
The management UI runs as a NodePort
Service on Kubernetes, and shows the connectivity
of the Services in this example.
You can view the UI by visiting http://<k8s-node-ip>:30002
in a browser.
Once all the pods are started, they should have full connectivity. You can see this by visiting the UI. Each service is represented by a single node in the graph.
backend
-> Node "B"frontend
-> Node "F"client
-> Node "C"
2) Enable isolation
Running following commands will prevent all access to the frontend, backend, and client Services.
kubectl create -n stars -f https://docs.tigera.io/files/default-deny.yaml
kubectl create -n client -f https://docs.tigera.io/files/default-deny.yaml
Confirm isolation
Refresh the management UI (it may take up to 10 seconds for changes to be reflected in the UI). Now that we've enabled isolation, the UI can no longer access the pods, and so they will no longer show up in the UI.
3) Allow the UI to access the services using network policy objects
Apply the following YAML files to allow access from the management UI.
kubectl create -f https://docs.tigera.io/files/allow-ui.yaml
kubectl create -f https://docs.tigera.io/files/allow-ui-client.yaml
After a few seconds, refresh the UI - it should now show the Services, but they should not be able to access each other anymore.
4) Create the backend-policy.yaml file to allow traffic from the frontend to the backend
kubectl create -f https://docs.tigera.io/files/backend-policy.yaml
Refresh the UI. You should see the following:
- The frontend can now access the backend (on TCP port 6379 only).
- The backend cannot access the frontend at all.
- The client cannot access the frontend, nor can it access the backend.
5) Expose the frontend service to the client namespace
kubectl create -f https://docs.tigera.io/files/frontend-policy.yaml
The client can now access the frontend, but not the backend. Neither the frontend nor the backend can initiate connections to the client. The frontend can still access the backend.
To use Calico Cloud to enforce egress policy on Kubernetes pods, see the advanced policy demo.
6) (Optional) Clean up the demo environment
You can clean up the demo by deleting the demo Namespaces:
kubectl delete ns client stars management-ui