Calico states the default network policy is to "deny" and yet RKE2's Calico behavior differs #6821
Answered
by
brandond
jskillin-idt
asked this question in
Q&A
Replies: 1 comment 1 reply
-
It might be worth documenting the relationship between RKE2 and the rest of the Calico tools, as well. It appears that RKE2 is missing the Calico API server and its associated CRDs which would enable a safer customization of Calico: |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
This is a fairly simple question, I hope! I am trying to understand how RKE2's custom installation of Calico differs from the officially documented version. RKE2 provides very little documentation on its use of Calico, beyond viewing the values.yaml from the RKE2 chart repo.
The issue I'm struggling with is trying to use Calico as the thing that manages the firewall rules on the nodes it's installed on. The documentation states that Calico, by default, denies traffic in several places (here and here) but I have not found this to be true in RKE2's particular version.
Is the RKE2 installation of Calico intended to manage the host firewall? Is it capable of that with just the
crd.projectcalico.org/v1
CRDs installed? Or is it intended to only manage the transition between host and pod traffic?Beta Was this translation helpful? Give feedback.
All reactions