You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
8 lines
446 B
8 lines
446 B
### 1. Why would a user apply the extra policies?
|
|
It is a second line of defence after Istio authorization policies and it protects pods and services that are not protected by Istio.
|
|
|
|
### 2. Effects they will have in the cluster
|
|
Please consult the name of and comments in each networkpolicy for further information.
|
|
|
|
### 3. We should achieve the same with AuthorizationPolicies
|
|
But there are components, e.g. Katib that are not secured by istio.
|
|
|