- 
                Notifications
    
You must be signed in to change notification settings  - Fork 486
 
Description
What happened?
Before 1.0.0-rc4, network traffic was "accepted" if network policies were matched. Now, they just return. This makes it very difficult to differentiate between whether the network policies were matched and passed or were unmatched.
What did you expect to happen?
Traffic to be accepted if it made it through the network policy or for a way to detect that it matched a network policy
How can we reproduce the behavior you experienced?
Steps to reproduce the behavior:
- Set iptables forward policy to drop
 - Try and figure out how to unmatched traffic (such as host traffic and traffic that didn't match a network policy)
 
**Screenshots / Architecture Diagrams / Network Topologies **
None
** System Information (please complete the following information):**
- Kube-Router Version (
kube-router --version): 1.0.1 - Kube-Router Parameters:
 
    - --hostname-override=172.28.0.3
    - --kubeconfig=/etc/kubernetes/kube-proxy-kubeconfig
    - --run-router=false
    - --run-firewall=true
    - --run-service-proxy=true
    - --service-cluster-ip-range=172.30.128.0/17
    - --metrics-port=20249
- Kubernetes Version (
kubectl version) : 1.18.6 - Cloud Type: On premise
 - Kubernetes Deployment Type: Custom
 - Kube-Router Deployment Type: static pod
 - Cluster Size: 9 nodes
 
** Logs, other output, metrics **
None
Additional context
It would be nice if there was a flag to either go back to the old behaviour, have a post-processing table name, or a way to set a mark if the network policies were matched.