Skip to content

Fix flightdeck Calico NetworkPolicy for SAMESITE network trust#110

Merged
ian-flores merged 1 commit intomainfrom
fix-flightdeck-calico-network-policy
Feb 4, 2026
Merged

Fix flightdeck Calico NetworkPolicy for SAMESITE network trust#110
ian-flores merged 1 commit intomainfrom
fix-flightdeck-calico-network-policy

Conversation

@ian-flores
Copy link
Contributor

@ian-flores ian-flores commented Feb 4, 2026

Summary

  • Add ingress rules allowing traffic from traefik and alloy namespaces on port 8080
  • Add egress rule to Kubernetes API server (port 443) for private network ranges
  • Fixes flightdeck pod failures in clusters with SAMESITE network trust (like duplicado03-staging)

Test plan

  • Deploy to duplicado03-staging with ptd ensure duplicado03-staging --only-steps network_policies
  • Verify flightdeck pods can reach API server
  • Verify web UI loads through traefik

Add missing ingress rules (traefik and alloy on port 8080) and
egress rule to Kubernetes API server (port 443) for flightdeck pods.
Fixes pod failures in clusters with restrictive network policies like
duplicado03-staging.
@ian-flores ian-flores marked this pull request as ready for review February 4, 2026 02:01
@ian-flores ian-flores requested a review from a team as a code owner February 4, 2026 02:01
Copy link
Collaborator

@statik statik left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thanks for fixing!

@ian-flores ian-flores merged commit 21fc6fd into main Feb 4, 2026
3 checks passed
@ian-flores ian-flores deleted the fix-flightdeck-calico-network-policy branch February 4, 2026 15:40
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants