Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[TC_35] Enforcement of Ingress and Egress Network Policies in Kubernetes #54

Open
jchmielewska opened this issue Sep 5, 2024 · 2 comments
Assignees
Labels
Test-Case Description of the Test Case

Comments

@jchmielewska
Copy link

Objective:

  • To validate the enforcement of ingress and egress network policies for pods in the Kubernetes environment.

Preconditions:

  • NebulOuS core is running.
  • Kubernetes cluster with network policies is integrated with NebulOuS.

Steps:

  1. Action:
  • Define and apply an ingress network policy for a pod (e.g., nginx-pod) that allows traffic only from a certain namespace (e.g., internal) on a specific port (e.g., 80).

Expected result:

  • The ingress policy is successfully applied. nginx-pod should only accept traffic on port 80 from pods within the internal namespace.
  1. Action:
  • Test the ingress policy by sending traffic to nginx-pod from a pod within the internal namespace and then from a pod outside this namespace.

Expected result:

  • Traffic from the pod within the internal namespace reaches nginx-pod. Traffic from the pod outside the internal namespace is blocked, and an attempt is logged.
  1. Action:
  • Define and apply an egress network policy for another pod (e.g., backend-pod) that restricts outbound traffic to a specific external IP address range.

Expected result:

  • The egress policy is successfully applied. backend-pod can only initiate outbound traffic to the specified IP address range.
  1. Action:
  • Test the egress policy by attempting to connect from backend-pod to an allowed external IP address and then to a disallowed IP address.

Expected result:

  • Connections to the allowed IP address are successful.
  • Attempts to connect to disallowed IP addresses are blocked and logged.
@jchmielewska jchmielewska added the Test-Case Description of the Test Case label Sep 5, 2024
@Iqqdd99 Iqqdd99 added the bug Something isn't working label Sep 5, 2024
@jchmielewska jchmielewska removed the bug Something isn't working label Sep 5, 2024
@jchmielewska
Copy link
Author

  • for automation

@jchmielewska
Copy link
Author

for the 2nd release

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Test-Case Description of the Test Case
Projects
None yet
Development

No branches or pull requests

4 participants