Skip to content

Add Network Policy to your Application#

A Network Policy allows you to specify how groups of pods are allowed to communicate with each other and with other network endpoints. It acts as a firewall for your pods, controlling both incoming and outgoing traffic based on defined rules. Network policies are used to enhance the security and isolation of your applications.

In SAAP we are using Network Policies to control communication between pods within our cluster. This helps ensure that your application pods can communicate only with specific pods (e.g., MongoDB) and restricts communication from other pods that should not have access. By configuring ingress and egress rules, you are specifying the allowed traffic paths, thus enhancing the security and control of your application's network communication.


  • Configure Network Policies to control pod communication.
  • Verify the effectiveness of Network Policies through testing with a different pod.

Key Results#

  • Successfully create and test a Network Policy and applied it to restrict pod communication.


Let's set a Network Policy on the review-mongodb pod so that no other pods can communicate with our database other than the application pod review.

  1. Add Network Policy YAML to your deploy/values.yaml.

    # Define a NetworkPolicy configuration.
        enabled: true  # Enable the NetworkPolicy.
        podSelector:  # Specify the pods to which the NetworkPolicy rules will apply.
          matchLabels:  # Define labels to match pods.
   mongodb  # Match pods with the label '' equal to 'mongodb'.
        ingress:  # Define ingress rules for incoming traffic.
          - ports:  # Specify a list of ports and their protocols.
              - protocol: TCP  # Allow TCP traffic on port 27017.
                port: 27017
            from:  # Define the source of allowed incoming traffic.
              - podSelector:  # Allow traffic from pods matching certain labels.
                  matchLabels:  # Match pods with the label '' equal to 'review'.

    It should look like this:

    network policy values

    Look at the different colors that indicates indentation.

    So, our application pod review will not entertain any traffic from any other pod.


    The indentation should be application.networkPolicy.

  2. Save and run tilt up at the root of your directory. Hit the space bar and the browser with TILT logs will be shown. If everything is green then the changes will be deployed on the cluster.

  3. Log in to SAAP and see if the Network Policy is created in your namespace.

    network policy on SAAP

  4. Open the review Network Policy, scroll down and see the rules:

    network policy rules

    We can see the rule is set properly.

To check if our Network Policy is working properly, let's create a random pod and try to communicate the review-mongodb pod through it.

  1. Create a pod in your namespace on SAAP. Copy below YAML:

    apiVersion: v1
    kind: Pod
      name: hello-pod
     - name: hello-container
       image: alpine
       command: ["/bin/sh", "-c"]
       args: ["echo Hello, World!; sleep 3600"]
  2. Click on Create Pod on the top right corner. Paste the YAML and hit save.

    new pod

    A new pod should be created.

  3. Go to the review-mongodb pod and copy the Pod IP.

    MongoDB pod ip

    Let's find the port for the review-mongodb pod. Once you copy the IP, scroll down to find the container. Click the review container.

    MongoDB container

    Scroll down and copy the port:

    MongoDB container port

  4. Let's go to hello-pod and then to it's Terminal. Paste this command, and make sure to replace the review-mongodb pod IP with yours.

    wget http://<review-mongodb-pod-ip>:27017

    permission denied

    We can see that hello-pod can't access review-mongodb.

Network Policies offer a robust mechanism to control and secure communication between pods in SAAP. By grasping the concepts and techniques covered in this tutorial, you're better equipped to implement effective network segmentation and enhance the overall security posture of your applications.

Cheers! Let's move to the next tutorial.