1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-05 12:46:18 +01:00
Files
openshift-docs/modules/serverless-services-network-policies.adoc

23 lines
1014 B
Plaintext

// Module included in the following assemblies:
//
// * serverless/knative-serving/config-applications/restrictive-cluster-policies.adoc
:_mod-docs-content-type: CONCEPT
[id="serverless-services-network-policies_{context}"]
= Clusters with restrictive network policies
If you are using a cluster that multiple users have access to, your cluster might use network policies to control which pods, services, and namespaces can communicate with each other over the network. If your cluster uses restrictive network policies, it is possible that Knative system pods are not able to access your Knative application. For example, if your namespace has the following network policy, which denies all requests, Knative system pods cannot access your Knative application:
.Example NetworkPolicy object that denies all requests to the namespace
[source,yaml]
----
kind: NetworkPolicy
apiVersion: networking.k8s.io/v1
metadata:
name: deny-by-default
namespace: example-namespace
spec:
podSelector:
ingress: []
----