Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
OpenShift Multi-Cluster Management Handbook

You're reading from   OpenShift Multi-Cluster Management Handbook Go from architecture to pipelines using GitOps

Arrow left icon
Product type Paperback
Published in Nov 2022
Publisher Packt
ISBN-13 9781803235288
Length 458 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Authors (2):
Arrow left icon
Rafael Pecora Rafael Pecora
Author Profile Icon Rafael Pecora
Rafael Pecora
Giovanni Fontana Giovanni Fontana
Author Profile Icon Giovanni Fontana
Giovanni Fontana
Arrow right icon
View More author details
Toc

Table of Contents (23) Chapters Close

Preface 1. Part 1 – Design Architectures for Red Hat OpenShift
2. Chapter 1: Hybrid Cloud Journey and Strategies FREE CHAPTER 3. Chapter 2: Architecture Overview and Definitions 4. Chapter 3: Multi-Tenant Considerations 5. Chapter 4: OpenShift Personas and Skillsets 6. Part 2 – Leverage Enterprise Products with Red Hat OpenShift
7. Chapter 5: OpenShift Deployment 8. Chapter 6: OpenShift Troubleshooting, Performance, and Best Practices 9. Chapter 7: OpenShift Network 10. Chapter 8: OpenShift Security 11. Part 3 – Multi-Cluster CI/CD on OpenShift Using GitOps
12. Chapter 9: OpenShift Pipelines – Tekton 13. Chapter 10: OpenShift GitOps – Argo CD 14. Chapter 11: OpenShift Multi-Cluster GitOps and Management 15. Part 4 – A Taste of Multi-Cluster Implementation and Security Compliance
16. Chapter 12: OpenShift Multi-Cluster Security 17. Chapter 13: OpenShift Plus – a Multi-Cluster Enterprise Ready Solution 18. Chapter 14: Building a Cloud-Native Use Case on a Hybrid Cloud Environment 19. Part 5 – Continuous Learning
20. Chapter 15: What’s Next 21. Index 22. Other Books You May Enjoy

Network isolation

Firewalls are well known and have been used for a long time in any kind of infrastructure. When it comes to OpenShift, we need to have in mind that we are now working with a software-defined platform and, as such, we have software features to implement some of the same concepts we have had for a long time in a data center—it is no different with a firewall. As we have seen in the previous chapter, Network Policies are nothing more than rules you define to allow or block network communication between pods and projects on OpenShift, similar to what a firewall provides in a physical network.

By default, all pods in a project are accessible from other pods and network endpoints from any project. To isolate pods and projects, you need to create network policies, such as the following:

kind: NetworkPolicy
apiVersion: networking.k8s.io/v1
metadata:
  name: deny-by-default
spec:
  podSelector: {}
  ingress: []

The previous network...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime