Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- # cilium policy trace --src-identity 6 --dst-identity 9326168
- ----------------------------------------------------------------
- Tracing From: [reserved:remote-node] => To: [k8s:io.cilium.k8s.namespace.labels.name=kube-system, k8s:io.cilium.k8s.policy.cluster=kube-master103, k8s:io.cilium.k8s.policy.serviceaccount=coredns, k8s:io.kubernetes.pod.namespace=kube-system, k8s:k8s-app=kube-dns] Ports: [0/ANY]
- Resolving ingress policy for [k8s:io.cilium.k8s.namespace.labels.name=kube-system k8s:io.cilium.k8s.policy.cluster=kube-master103 k8s:io.cilium.k8s.policy.serviceaccount=coredns k8s:io.kubernetes.pod.namespace=kube-system k8s:k8s-app=kube-dns]
- * Rule {"matchLabels":{"k8s:io.kubernetes.pod.namespace":"kube-system"}}: selected
- Allows from labels {"matchLabels":{"k8s:io.cilium.k8s.namespace.labels.name":"monitoring"}}
- No label match for [reserved:remote-node]
- Allows from labels {"matchLabels":{"k8s:io.cilium.k8s.namespace.labels.name":"kube-system"}}
- No label match for [reserved:remote-node]
- 1/1 rules selected
- Found no allow rule
- Ingress verdict: denied
Advertisement
Add Comment
Please, Sign In to add comment