This commit is contained in:
parent
6f178af19b
commit
e2bb4a7cb8
10 changed files with 60 additions and 32 deletions
|
|
@ -37,7 +37,7 @@ spec:
|
|||
action. Both selector-based security Policy and security Profiles
|
||||
reference rules - separated out as a list of rules for both ingress
|
||||
and egress packet matching. \n Each positive match criteria has
|
||||
a negated version, prefixed with ”Not”. All the match criteria
|
||||
a negated version, prefixed with \"Not\". All the match criteria
|
||||
within a rule must be satisfied for a packet to match. A single
|
||||
rule can contain the positive and negative version of a match
|
||||
and both must be satisfied for the rule to match."
|
||||
|
|
@ -120,9 +120,9 @@ spec:
|
|||
One negates the set of matched endpoints, the other negates
|
||||
the whole match: \n \tSelector = \"!has(my_label)\" matches
|
||||
packets that are from other Calico-controlled \tendpoints
|
||||
that do not have the label “my_label”. \n \tNotSelector
|
||||
that do not have the label \"my_label\". \n \tNotSelector
|
||||
= \"has(my_label)\" matches packets that are not from
|
||||
Calico-controlled \tendpoints that do have the label “my_label”.
|
||||
Calico-controlled \tendpoints that do have the label \"my_label\".
|
||||
\n The effect is that the latter will accept packets from
|
||||
non-Calico sources whereas the former is limited to packets
|
||||
from Calico-controlled endpoints."
|
||||
|
|
@ -325,9 +325,9 @@ spec:
|
|||
One negates the set of matched endpoints, the other negates
|
||||
the whole match: \n \tSelector = \"!has(my_label)\" matches
|
||||
packets that are from other Calico-controlled \tendpoints
|
||||
that do not have the label “my_label”. \n \tNotSelector
|
||||
that do not have the label \"my_label\". \n \tNotSelector
|
||||
= \"has(my_label)\" matches packets that are not from
|
||||
Calico-controlled \tendpoints that do have the label “my_label”.
|
||||
Calico-controlled \tendpoints that do have the label \"my_label\".
|
||||
\n The effect is that the latter will accept packets from
|
||||
non-Calico sources whereas the former is limited to packets
|
||||
from Calico-controlled endpoints."
|
||||
|
|
@ -368,7 +368,7 @@ spec:
|
|||
action. Both selector-based security Policy and security Profiles
|
||||
reference rules - separated out as a list of rules for both ingress
|
||||
and egress packet matching. \n Each positive match criteria has
|
||||
a negated version, prefixed with ”Not”. All the match criteria
|
||||
a negated version, prefixed with \"Not\". All the match criteria
|
||||
within a rule must be satisfied for a packet to match. A single
|
||||
rule can contain the positive and negative version of a match
|
||||
and both must be satisfied for the rule to match."
|
||||
|
|
@ -451,9 +451,9 @@ spec:
|
|||
One negates the set of matched endpoints, the other negates
|
||||
the whole match: \n \tSelector = \"!has(my_label)\" matches
|
||||
packets that are from other Calico-controlled \tendpoints
|
||||
that do not have the label “my_label”. \n \tNotSelector
|
||||
that do not have the label \"my_label\". \n \tNotSelector
|
||||
= \"has(my_label)\" matches packets that are not from
|
||||
Calico-controlled \tendpoints that do have the label “my_label”.
|
||||
Calico-controlled \tendpoints that do have the label \"my_label\".
|
||||
\n The effect is that the latter will accept packets from
|
||||
non-Calico sources whereas the former is limited to packets
|
||||
from Calico-controlled endpoints."
|
||||
|
|
@ -656,9 +656,9 @@ spec:
|
|||
One negates the set of matched endpoints, the other negates
|
||||
the whole match: \n \tSelector = \"!has(my_label)\" matches
|
||||
packets that are from other Calico-controlled \tendpoints
|
||||
that do not have the label “my_label”. \n \tNotSelector
|
||||
that do not have the label \"my_label\". \n \tNotSelector
|
||||
= \"has(my_label)\" matches packets that are not from
|
||||
Calico-controlled \tendpoints that do have the label “my_label”.
|
||||
Calico-controlled \tendpoints that do have the label \"my_label\".
|
||||
\n The effect is that the latter will accept packets from
|
||||
non-Calico sources whereas the former is limited to packets
|
||||
from Calico-controlled endpoints."
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue