Using k8s network policy or calico, can I only use these tools for pod to pod cluster network policies. I already have network rules for external cluster policies.
For example if I apply this calico rule:
apiVersion: projectcalico.org/v3
kind: NetworkPolicy
metadata:
name: allow-ingress-from-b
namespace: app
spec:
selector: app == 'a'
ingress:
- action: Allow
protocol: TCP
source:
selector: app == 'b'
destination:
ports:
- 80
In this example I allow traffic coming from app B to app A. But this will disallow every other ingress traffic going to A. Would it be possible to only apply this rule from pod to pod ?