Skip to content

Vault network policy - update#128

Merged
mlorenzofr merged 18 commits into
validatedpatterns:mainfrom
p-rog:network-policy
May 8, 2026
Merged

Vault network policy - update#128
mlorenzofr merged 18 commits into
validatedpatterns:mainfrom
p-rog:network-policy

Conversation

@p-rog
Copy link
Copy Markdown
Collaborator

@p-rog p-rog commented May 7, 2026

Add NetworkPolicy for the Vault namespace.

  • add overrides/values-vault-network-policy.yaml with ingress/egress rules for Vault server pods and a default-deny policy for the vault namespace
  • enable the policies via extraValueFiles in values-hub.yaml for the vault application
  • Ingress: allows OCP router (UI/API via Route), qtodo namespace (SPIFFE JWT auth on port 8200), and intra-cluster Vault HA replication (port 8201)
  • Egress: allows CoreDNS (port 5353), SPIRE OIDC discovery provider (JWKS fetching), Vault HA replication, and Kubernetes API server (TokenReview for ESO)

Depends on validatedpatterns/hashicorp-vault-chart#18 which adds the default-deny NetworkPolicy template to the wrapper chart.

Copy link
Copy Markdown
Collaborator

@sabre1041 sabre1041 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

Copy link
Copy Markdown
Collaborator

@mlorenzofr mlorenzofr left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

everything worked fine in my test cluster

LGTM

@mlorenzofr mlorenzofr merged commit 6f0eb1d into validatedpatterns:main May 8, 2026
3 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants