Skip to content

Egress NetworkPolicy from Helm blocks kube-api traffic with Cilium #8285

@DeD1rk

Description

@DeD1rk

This is more of a cilium issue than a cert-manager one, but I'm posting it here so others may find it.

When enforcing network policies with Cilium, the allow-egress policy that's created trhough helm if webhook.networkPolicy.enabled=true doesn't work. While that policy should allow pretty much all egress (including TCP/(6)443), to ipBlock 0.0.0.0/0, this doesn't work on Cilium when your kube-apiserver is hosted on cluster nodes, unless you configure this: https://docs.cilium.io/en/stable/security/policy/language/#selecting-nodes-with-cidr-ipblock. See also cilium/cilium#20550.

Cert-manager could also help here by:

  • Documenting this somewhere, e.g. in the Helm values documentation.
  • Offering a way to only enable the ingress NetworkPolicy.

(Based on cilium v1.18.4 and cert-manager v1.18.2)

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions