Kubernetes Network Policy Recipes is a repository containing various use cases and sample YAML files for implementing Kubernetes Network Policies. The repository provides practical examples for controlling network traffic to applications running on Kubernetes clusters. The tool focuses on helping users understand how to drop or restrict traffic using Network Policies, which operate at layer 3 or 4 of the OSI model (IP and port level). It includes configurations for controlling both ingress (incoming) and egress (outgoing) traffic from pods. The repository contains ready-to-use YAML configurations that can be applied to Kubernetes environments. It covers different scenarios and use cases for network segmentation and traffic control within Kubernetes clusters. The tool is designed to work with cloud providers that support Network Policies, with Google Kubernetes Engine being specifically mentioned as an easy platform for testing. The repository serves as a practical guide for implementing network security controls in containerized environments.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A userland implementation of the Network Block Device protocol that enables remote block device access over network connections for distributed storage and virtualization use cases.
NordVPN is a commercial VPN service that encrypts internet connections and hides IP addresses through a global network of servers, featuring integrated threat protection and multi-device support.
A Bluetooth 5 and 4.x sniffer using TI CC1352/CC26x2 hardware with advanced features and Python-based host-side software.
A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.
A free, open-source network protocol analyzer for capturing and displaying packet-level data.
Unfurl is a URL analysis tool that extracts and visualizes data from URLs, breaking them down into components and presenting the information visually.
Snort is an open source intrusion prevention system that uses rules to detect and prevent malicious network activity.
NBD (Network Block Device) is a network protocol implementation that allows clients to access remote block devices over a network as if they were local storage.
Suricata offers real-time intrusion detection, intrusion prevention, and network monitoring.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.