Skip to content

Feat/153 network policy expansion accross namespaces#230

Open
benie-joy-possi wants to merge 18 commits intomainfrom
feat/153-network-policy-expansion-accross-namespaces
Open

Feat/153 network policy expansion accross namespaces#230
benie-joy-possi wants to merge 18 commits intomainfrom
feat/153-network-policy-expansion-accross-namespaces

Conversation

@benie-joy-possi
Copy link
Copy Markdown
Collaborator

Expand namespace isolation with explicit network policy coverage.

benie-joy-possi and others added 18 commits April 14, 2026 13:23
Co-authored-by: stephane-segning <stephane-segning@users.noreply.github.com>
Co-authored-by: benie-joy-possi <benie-joy-possi@users.noreply.github.com>
@github-actions
Copy link
Copy Markdown
Contributor

The pull request Feat/153 network policy expansion accross namespaces introduces extensive NetworkPolicy coverage across multiple namespaces in the Helm charts.

Key Observations:

  • Purpose: Enforces stronger network isolation by implementing default-deny-like structures and explicit allowed ingress/egress rules across various components (cert, core-gateway, librechart, mcps).
  • Structure: The implementation uses Helm if blocks to conditionally enable these policies based on .Values.networkPolicy.enabled or specific keys in .Values.policies. This allows for flexible adoption.
  • Granularity: Policies are well-defined with specific namespaceSelector and podSelector criteria, adhering to principles of least privilege.
  • Egress Control: Egress is strictly controlled, generally allowing DNS (kube-system), intra-namespace traffic, and specific dependencies (like API servers or other services).
  • Changes:
    • Adds several new networkpolicy.yaml templates across charts.
    • Updates values.yaml files to support these new configurations.
    • Refactors models-proxy by removing an existing policy template and integrating it into the new structure via values.yaml updates.

Potential Considerations:

  1. Default Deny: Ensure that enabling these policies does not break existing traffic flows if not all required communication paths are accounted for in the ingress/egress rules.
  2. Naming Consistency: The naming conventions for network policies seem consistent across the added files.
  3. Complexity: The core-gateway/templates/networkpolicy.yaml file is quite large (500+ lines) due to containing multiple policy definitions. While functional, it might be beneficial to consider splitting these into smaller, modular files if maintenance becomes difficult.

Overall, this is a significant enhancement to the security posture of the infrastructure. The implementation appears systematic and follows Kubernetes best practices for network isolation.

New%20session%20-%202026-04-17T18%3A20%3A55.858Z
opencode session  |  github run

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[Ticket] Expand NetworkPolicies across application namespaces

1 participant