Replies: 2 comments
-
Lets just have a property on pods to easily configure this |
Beta Was this translation helpful? Give feedback.
0 replies
-
Converted to issue: #891 |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
There's a way to create network policies that isolate pods for egress / ingress. That is, pods won't be able to accept or initiate network traffic.
Intuitively, as far as security and architectural best practices, this feels like it should be the default. Any network connection should be explicitly defined and allowed.
cdk8s-plus
allows us to apply this default very easily, question is - should we?Beta Was this translation helpful? Give feedback.
All reactions