You can configure a namespace-level network policy after enabling network isolation.
By default, Network Isolation is disabled for namespaces. For example, if network isolation is off for namespace default, all workloads in the current cluster can access the workloads in namespace default.
To prevent other workloads from accessing the workloads in namespace default, perform the following steps:
Only clusters that use the tunnel network model support network isolation.
After network isolation is enabled, workloads in namespace default can access each other but they cannot be accessed by workloads in other namespaces.
Enabling network isolation is to create a network policy in a namespace. The network policy selects all pods in the namespace and prevents pods in other namespaces from accessing.
kind: NetworkPolicy apiVersion: networking.k8s.io/v1 metadata: name: deny-default namespace: default spec: ingress: - from: - podSelector: {} podSelector: {} # {} indicates that all pods are selected.
You can also customize a network policy. For details, see Network Policies.