fix: re-enable NetworkPolicies + add monitoring ingress to postgres policy #94
Labels
No labels
domain:backend
domain:devops
domain:frontend
status:approved
status:in-progress
status:needs-fix
status:qa
type:bug
type:devops
type:feature
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
forgejo_admin/pal-e-platform#94
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Lineage
bug-kube-router-ipset-empty(bug fix)Repo
forgejo_admin/pal-e-platformUser Story
As a platform operator
I want NetworkPolicies re-enabled with correct ingress rules
So that Layer 1 of the three-layer security model is operational again
Context
NetworkPolicies were emergency-rolled-back (all deleted) after kube-router ipset population failure blocked all cross-namespace traffic for 44h. Investigation revealed kube-router is now functioning correctly — test NetworkPolicy created ipsets with 72+ pod IPs and proper
match-setiptables rules.All 9 policies were re-applied via
tofu taint+tofu apply -target. Validation found one gap: the postgres namespace policy was missingmonitoringnamespace ingress, causing Prometheus to lose the postgres scrape target (37 UP, 1 DOWN).File Targets
Files to modify:
terraform/network-policies.tf— addmonitoringnamespace to postgres NetworkPolicy ingress rulesFiles NOT to touch:
tofu apply, not code changesAcceptance Criteria
Test Expectations
kubectl get networkpolicies -Ashows 9 policieswget -qO- http://localhost:9090/api/v1/targetsshows 0 DOWNConstraints
-lock=falsefortofu planin agent promptsChecklist
tofu fmt -checkpassestofu validatepassesRelated
pal-e-platform— projectbug-kube-router-ipset-empty— root bugsop-network-security— three-layer architecture