Installing network policies for License Service Reporter
If you have a deny-all
or allow-same-namespace
policy in place, import and install network policies for License Service Reporter.
Import and install network policies for License Service Reporter to work in the following scenarios:
- If you have the
deny-all
policy in place, the ingress traffic to all pods is not allowed. - If the cluster has
allow-same-namespace
policy in place, the communication between the pods across namespaces can be blocked.
If you do not use deny-all
or allow-same-namespace
policy, you do not need to import or install network policies.
For more information, see About network policy in Red Hat® OpenShift® Container Platform documentation.
Installing network policies
-
Install License Service Reporter Egress.
- Go to the GitHub repository with License Service Reporter Egress.
- Download all
yaml
files that are present in this repository. -
Make the following adjustments in the
.yaml
files that you downloaded:- Set the
namespace
under themetadata
section to the namespace where License Service Reporter is installed. - Make sure that the
spec.podSelector.matchLabels
definition matches the labels of the License Service Reporter operator pod.
- Set the
-
Apply the files on your cluster by running the following command for each file:
kubectl apply -f <the-file-name>
-
Install License Service Reporter Ingress.
- Go to the GitHub repository with License Service Reporter Ingress.
- Download all
yaml
files that are present in this repository. -
Make the following adjustments in the
.yaml
files that you downloaded:- Set the
namespace
under themetadata
section to the namespace where License Service Reporter is installed. - Make sure that the
spec.podSelector.matchLabels
definition matches the labels of the License Service Reporter instance pod.
- Set the
-
Apply the files on your cluster by running the following command for each file:
kubectl apply -f <the-file-name>