12.4. Editing an egress firewall for a project
As a cluster administrator, you can modify network traffic rules for an existing egress firewall.
12.4.1. Editing an EgressNetworkPolicy object 复制链接链接已复制到粘贴板!
As a cluster administrator, you can update the egress firewall for a project.
Prerequisites
- A cluster using the OpenShift SDN network plug-in.
-
Install the OpenShift CLI (
oc). - You must log in to the cluster as a cluster administrator.
Procedure
To edit an existing egress network policy object for a project, complete the following steps:
Find the name of the EgressNetworkPolicy object for the project. Replace
<project>with the name of the project.$ oc get -n <project> egressnetworkpolicyOptional: If you did not save a copy of the EgressNetworkPolicy object when you created the egress network firewall, enter the following command to create a copy.
$ oc get -n <project> \1 egressnetworkpolicy <name> \2 -o yaml > <filename>.yaml3 Enter the following command to replace the EgressNetworkPolicy object. Replace
<filename>with the name of the file containing the updated EgressNetworkPolicy object.$ oc replace -f <filename>.yaml
12.4.2. EgressNetworkPolicy custom resource (CR) object 复制链接链接已复制到粘贴板!
The following YAML describes an EgressNetworkPolicy CR object:
apiVersion: network.openshift.io/v1
kind: EgressNetworkPolicy
metadata:
name: <name>
spec:
egress:
...
12.4.2.1. EgressNetworkPolicy rules 复制链接链接已复制到粘贴板!
The following YAML describes an egress firewall rule object. The egress key expects an array of one or more objects.
egress:
- type: <type>
to:
cidrSelector: <cidr>
dnsName: <dns-name>
12.4.2.2. Example EgressNetworkPolicy CR object 复制链接链接已复制到粘贴板!
The following example defines several egress firewall policy rules:
apiVersion: network.openshift.io/v1
kind: EgressNetworkPolicy
metadata:
name: default-rules
spec:
egress:
- type: Allow
to:
cidrSelector: 1.2.3.0/24
- type: Allow
to:
dnsName: www.example.com
- type: Deny
to:
cidrSelector: 0.0.0.0/0