Skip to content

Commit

Permalink
docs: Upgrade Note For Deny Policy Fix
Browse files Browse the repository at this point in the history
Signed-off-by: Nate Sweet <nathanjsweet@pm.me>
  • Loading branch information
nathanjsweet authored and borkmann committed Jun 29, 2023
1 parent 2b3d8a6 commit 7af6450
Showing 1 changed file with 36 additions and 0 deletions.
36 changes: 36 additions & 0 deletions Documentation/operations/upgrade.rst
Original file line number Diff line number Diff line change
Expand Up @@ -342,6 +342,42 @@ Annotations:
to prevent the possibility of connectivity disruptions. Note: this issue does not
affect setups using a persistent etcd cluster instead of the ephemeral one bundled
with the *clustermesh-apiserver*.
* Deny policies now always take precedence over allow policies. Previously, a CIDR-based
allow policy would always allow traffic, even if there was an overlapping CIDR-based deny policy
to deny the same traffic. Now, a CIDR-based deny policy drops traffic when there is
an allow policy for the same traffic.

Verify that all of your CIDR-based deny and allow policies work
as intended. The following example shows an allow policy that would previously allow
all egress traffic to ``20.1.1.1`` for its selector, but that traffic will now be dropped
by the deny policy:

.. code-block:: yaml
apiVersion: "cilium.io/v2"
kind: CiliumNetworkPolicy
metadata:
name: "allow-to-external-service"
spec:
endpointSelector:
matchLabels:
app: some-specific-app
egress:
- toCIDR:
- 20.1.1.1/32
.. code-block:: yaml
apiVersion: "cilium.io/v2"
kind: CiliumNetworkPolicy
metadata:
name: "deny-all-external-egress-traffic"
spec:
endpointSelector: {}
egressDeny:
- toCIDR:
- 0.0.0.0/0
Removed Options
~~~~~~~~~~~~~~~
Expand Down

0 comments on commit 7af6450

Please sign in to comment.