Guest User

Untitled

a guest
Nov 2nd, 2020
24
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.07 KB | None | 0 0
  1. # cilium policy trace --src-identity 6 --dst-identity 9326168
  2. ----------------------------------------------------------------
  3.  
  4. Tracing From: [reserved:remote-node] => To: [k8s:io.cilium.k8s.namespace.labels.name=kube-system, k8s:io.cilium.k8s.policy.cluster=kube-master103, k8s:io.cilium.k8s.policy.serviceaccount=coredns, k8s:io.kubernetes.pod.namespace=kube-system, k8s:k8s-app=kube-dns] Ports: [0/ANY]
  5.  
  6. Resolving ingress policy for [k8s:io.cilium.k8s.namespace.labels.name=kube-system k8s:io.cilium.k8s.policy.cluster=kube-master103 k8s:io.cilium.k8s.policy.serviceaccount=coredns k8s:io.kubernetes.pod.namespace=kube-system k8s:k8s-app=kube-dns]
  7. * Rule {"matchLabels":{"k8s:io.kubernetes.pod.namespace":"kube-system"}}: selected
  8. Allows from labels {"matchLabels":{"k8s:io.cilium.k8s.namespace.labels.name":"monitoring"}}
  9. No label match for [reserved:remote-node]
  10. Allows from labels {"matchLabels":{"k8s:io.cilium.k8s.namespace.labels.name":"kube-system"}}
  11. No label match for [reserved:remote-node]
  12. 1/1 rules selected
  13. Found no allow rule
  14. Ingress verdict: denied
  15.  
Advertisement
Add Comment
Please, Sign In to add comment