adamant-kite-43734
08/23/2024, 10:43 AMlively-fall-27200
08/23/2024, 11:03 AMelegant-intern-64206
08/23/2024, 12:31 PMNetworkPolicy
.
By default, all kubectl
operations in the shell impersonate the user's permissions from a control plane perspective. Also, there are no NetworkPolicy
blocking egress network traffic for the Shell pods.
The option to completely disable this feature is already being tracked publicly, so I would recommend you add a comment that this feature is also important to you on that issue, so that the Product team can more effectively prioritise it.
However, things you could do in the mean time:
• Block egress from Shell pods by using a NetworkPolicy in your local cluster.
• Block the scheduling of Shell pods at Admission point. This could be done via ValidatingAdmissionPolicy for example.