Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adds a bunch of flexability around egress #1019

Merged
merged 4 commits into from
Jan 5, 2025
Merged

Conversation

thebsdbox
Copy link
Collaborator

In the event that a pod is on multiple networks we may have a scenario where we don't want to egress to that network.

If we want to ensure we don't egress for a CIDR we can add to the service the following:

kube-vip.io/egress-denied-networks:172.18.0.0/24

These are comma separated values, so we we can add multiple networks not to egress.

Additionally if we want to egress to only certain networks we can do the following:

kube-vip.io/egress-allowed-networks:172.18.0.0/24

(I've also moved all of the testing about a bit to make this easier to test)

@thebsdbox thebsdbox requested a review from Cellebyte December 20, 2024 16:29
@thebsdbox thebsdbox merged commit 430efae into main Jan 5, 2025
15 checks passed
@thebsdbox thebsdbox deleted the egress_annotations branch January 5, 2025 15:27
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant