Skip to content

Commit

Permalink
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
changed names of pods in anp_banp_blog_demo test
Browse files Browse the repository at this point in the history
tanyaveksler committed Jan 14, 2025
1 parent 76c3876 commit ae74452
Showing 1 changed file with 20 additions and 20 deletions.
40 changes: 20 additions & 20 deletions test_outputs/connlist/anp_banp_blog_demo_explain_output.txt
Original file line number Diff line number Diff line change
@@ -1,45 +1,45 @@
----------------------------------------------------------------------------------------------------------------------------------------------------------------
CONNECTIONS BETWEEN 0.0.0.0-255.255.255.255 => foo/my-foo[Pod]:
CONNECTIONS BETWEEN 0.0.0.0-255.255.255.255 => foo/myfoo[Pod]:

No Connections due to the following policies//rules:
EGRESS DIRECTION (ALLOWED) due to the assumed default for IPblock (Allow all)
INGRESS DIRECTION (DENIED)
1) [NP] foo/allow-monitoring//Ingress (captured but not selected by any Ingress rule)

----------------------------------------------------------------------------------------------------------------------------------------------------------------
CONNECTIONS BETWEEN bar/my-bar[Pod] => foo/my-foo[Pod]:
CONNECTIONS BETWEEN bar/mybar[Pod] => foo/myfoo[Pod]:

No Connections due to the following policies//rules:
EGRESS DIRECTION (ALLOWED) due to the system default (Allow all)
INGRESS DIRECTION (DENIED)
1) [NP] foo/allow-monitoring//Ingress (captured but not selected by any Ingress rule)

----------------------------------------------------------------------------------------------------------------------------------------------------------------
CONNECTIONS BETWEEN baz/my-baz[Pod] => bar/my-bar[Pod]:
CONNECTIONS BETWEEN baz/mybaz[Pod] => bar/mybar[Pod]:

No Connections due to the following policies//rules:
EGRESS DIRECTION (ALLOWED) due to the system default (Allow all)
INGRESS DIRECTION (DENIED)
1) [BANP] default//Ingress rule deny-ingress-from-all-namespaces (Deny)

----------------------------------------------------------------------------------------------------------------------------------------------------------------
CONNECTIONS BETWEEN baz/my-baz[Pod] => foo/my-foo[Pod]:
CONNECTIONS BETWEEN baz/mybaz[Pod] => foo/myfoo[Pod]:

No Connections due to the following policies//rules:
EGRESS DIRECTION (ALLOWED) due to the system default (Allow all)
INGRESS DIRECTION (DENIED)
1) [NP] foo/allow-monitoring//Ingress (captured but not selected by any Ingress rule)

----------------------------------------------------------------------------------------------------------------------------------------------------------------
CONNECTIONS BETWEEN foo/my-foo[Pod] => bar/my-bar[Pod]:
CONNECTIONS BETWEEN foo/myfoo[Pod] => bar/mybar[Pod]:

No Connections due to the following policies//rules:
EGRESS DIRECTION (ALLOWED) due to the system default (Allow all)
INGRESS DIRECTION (DENIED)
1) [BANP] default//Ingress rule deny-ingress-from-all-namespaces (Deny)

----------------------------------------------------------------------------------------------------------------------------------------------------------------
CONNECTIONS BETWEEN monitoring/my-monitoring[Pod] => bar/my-bar[Pod]:
CONNECTIONS BETWEEN monitoring/mymonitoring[Pod] => bar/mybar[Pod]:

No Connections due to the following policies//rules:
EGRESS DIRECTION (ALLOWED) due to the system default (Allow all)
@@ -48,15 +48,15 @@ No Connections due to the following policies//rules:
2) [BANP] default//Ingress rule deny-ingress-from-all-namespaces (Deny)

----------------------------------------------------------------------------------------------------------------------------------------------------------------
CONNECTIONS BETWEEN monitoring/my-monitoring[Pod] => baz/my-baz[Pod]:
CONNECTIONS BETWEEN monitoring/mymonitoring[Pod] => baz/mybaz[Pod]:

All Connections due to the following policies//rules:
EGRESS DIRECTION (ALLOWED) due to the system default (Allow all)
INGRESS DIRECTION (ALLOWED)
1) [ANP] allow-monitoring//Ingress rule allow-ingress-from-monitoring (Allow)

----------------------------------------------------------------------------------------------------------------------------------------------------------------
CONNECTIONS BETWEEN monitoring/my-monitoring[Pod] => foo/my-foo[Pod]:
CONNECTIONS BETWEEN monitoring/mymonitoring[Pod] => foo/myfoo[Pod]:

All Connections due to the following policies//rules:
EGRESS DIRECTION (ALLOWED) due to the system default (Allow all)
@@ -66,15 +66,15 @@ All Connections due to the following policies//rules:

----------------------------------------------------------------------------------------------------------------------------------------------------------------
The following nodes are connected due to the system default or the assumed default for IPblock (Allow all):
0.0.0.0-255.255.255.255 => bar/my-bar[Pod]
0.0.0.0-255.255.255.255 => baz/my-baz[Pod]
0.0.0.0-255.255.255.255 => monitoring/my-monitoring[Pod]
bar/my-bar[Pod] => 0.0.0.0-255.255.255.255
bar/my-bar[Pod] => baz/my-baz[Pod]
bar/my-bar[Pod] => monitoring/my-monitoring[Pod]
baz/my-baz[Pod] => 0.0.0.0-255.255.255.255
baz/my-baz[Pod] => monitoring/my-monitoring[Pod]
foo/my-foo[Pod] => 0.0.0.0-255.255.255.255
foo/my-foo[Pod] => baz/my-baz[Pod]
foo/my-foo[Pod] => monitoring/my-monitoring[Pod]
monitoring/my-monitoring[Pod] => 0.0.0.0-255.255.255.255
0.0.0.0-255.255.255.255 => bar/mybar[Pod]
0.0.0.0-255.255.255.255 => baz/mybaz[Pod]
0.0.0.0-255.255.255.255 => monitoring/mymonitoring[Pod]
bar/mybar[Pod] => 0.0.0.0-255.255.255.255
bar/mybar[Pod] => baz/mybaz[Pod]
bar/mybar[Pod] => monitoring/mymonitoring[Pod]
baz/mybaz[Pod] => 0.0.0.0-255.255.255.255
baz/mybaz[Pod] => monitoring/mymonitoring[Pod]
foo/myfoo[Pod] => 0.0.0.0-255.255.255.255
foo/myfoo[Pod] => baz/mybaz[Pod]
foo/myfoo[Pod] => monitoring/mymonitoring[Pod]
monitoring/mymonitoring[Pod] => 0.0.0.0-255.255.255.255

0 comments on commit ae74452

Please sign in to comment.