I have multiple namespaces in my k8 cluster. All I want is that pods in development namespace can communicate with all other pods in other namespaces but should not be able to communicate with resources in production namespace.
I was not able to find a document for this scenario. There is a deny all policy like this
---
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
name: default-deny-egress
spec:
podSelector: {}
policyTypes:
- Egress
- Ingress
but it applies at pod level in the same namespace. How can I modify the same to meet my requirements?