Ensure that network policy support is enabled for your OCI Kubernetes Engine (OKE) clusters in order to implement secure policy-based access control in order to segment and isolate traffic. The OCI VCN-Native Pod Networking CNI is the recommended CNI for OCI Kubernetes Engine (OKE) and comes fully integrated with network policy enforcement via Calico. The Flannel Overlay CNI does not natively support enabling network policies.
A network policy is a Kubernetes resource that allows you to control the traffic between pods and services within an OKE cluster. Network policies are useful for enforcing security policies, isolating applications, and debugging network connectivity issues. By default, pods are not isolated, meaning they accept traffic from any source. Isolation is achieved by applying a network policy to select pods. Once a network policy is in place for a namespace, specifying a particular pod, that pod will reject any connections not permitted by the applied network policy. Network policies enforce Zero Trust micro-segmentation between pods, and the VCN-Native Pod Networking CNI is the only officially supported CNI in OCI Kubernetes Engine (OKE) that allows this vital least-privilege security model to be implemented via a policy engine like Calico.
Audit
To determine if network policy support is enabled for your OCI Kubernetes Engine (OKE) clusters, perform the following operations:
Remediation / Resolution
To enable network policy support for your OCI Kubernetes Engine (OKE) cluster, you have to re-create your cluster with the required networking configuration, by performing the following operations:
References
- Oracle Cloud Infrastructure Documentation
- Overview of Kubernetes Engine (OKE)
- Managing Kubernetes Clusters
- Oracle Cloud Infrastructure CLI Documentation
- compartment list
- cluster list
- cluster get
- cluster create