Testing Namespace Isolation using NetworkPolicy

In my post Isolating namespaces with NetworkPolicy, I presented a pattern for isolating namespaces from each other in a cluster using NetworkPolicy. Let’s put those concepts in to practice. Trying it out Cluster requirements This example is designed to run on GKE, using DPv2 and CloudDNS. This is the default for Autopilot, so the following… Continue reading Testing Namespace Isolation using NetworkPolicy

Isolating namespaces with NetworkPolicy

Kubernetes allows for multi-tenancy within the cluster using namespaces. You can host multiple different applications each in their own namespace that at times can feel almost like a separate cluster. If you configure RBAC you can grant users and service accounts access to specific namespaces and even control what objects they can modify within. However,… Continue reading Isolating namespaces with NetworkPolicy