Calico network policy in Kubernetes based on Domain name Regex Matching

6/24/2021

I have a application running with kubernetes orchestrator. I want to implement calico network policy based on domain name Regex matching. I am seeing in calico doc that they are using ip range(CIDR) to control incoming and outgoing calls.<br/>Can same thing be done using domain name regex matching instead of CIDR ? Some example would be helpful.

For instance I want my calico network policy to allow ingress call for domain:<br/> "^.+\\.app\\.ubuntu\\.net$ ^.+\\.aws-tools.org$ ^local\\.aws-tools\\.org

quot;

-- solveit
calico
k3s
kubernetes
kubernetes-networkpolicy
project-calico

0 Answers