Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Linux Foundation Exam CKA Topic 3 Question 63 Discussion

Actual exam question for Linux Foundation's CKA exam
Question #: 63
Topic #: 3
[All CKA Questions]

Score: 7%

Task

Create a new NetworkPolicy named allow-port-from-namespace in the existing namespace echo. Ensure that the new NetworkPolicy allows Pods in namespace my-app to connect to port 9000 of Pods in namespace echo.

Further ensure that the new NetworkPolicy:

* does not allow access to Pods, which don't listen on port 9000

* does not allow access from Pods, which are not in namespace my-app

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Vallie
5 months ago
I'm a bit concerned about the 'does not allow access from Pods, which are not in namespace my-app' part. Shouldn't we also specify the 'from' selector in the ingress rule?
upvoted 0 times
Lettie
3 months ago
Let's update the NetworkPolicy yaml file to include the 'from' selector for the ingress rule. That way, we can restrict access to only Pods in the my-app namespace.
upvoted 0 times
...
Merlyn
3 months ago
That makes sense. We need to ensure that only Pods from the my-app namespace can access port 9000 in the echo namespace.
upvoted 0 times
...
Tegan
3 months ago
Yes, you're right. We should add the 'from' selector in the ingress rule to specify Pods in the my-app namespace.
upvoted 0 times
...
Ariel
3 months ago
Agreed, let's update the ingress rule to include the 'from' selector for Pods in namespace my-app.
upvoted 0 times
...
Frank
4 months ago
That's a good point. We need to make sure only Pods from namespace my-app can access port 9000.
upvoted 0 times
...
Dick
4 months ago
Yes, you're right. We should add the 'from' selector in the ingress rule to specify Pods in namespace my-app.
upvoted 0 times
...
...
Ryan
5 months ago
I feel confident about this question, I have practiced similar tasks before.
upvoted 0 times
...
Sommer
5 months ago
Haha, the question says 'ensure that the new NetworkPolicy allows Pods in namespace my-app to connect to port 9000', but the solution is using port 8080. Someone needs to pay more attention to the details!
upvoted 0 times
Loren
5 months ago
Yeah, attention to detail is key in these scenarios. Port numbers matter!
upvoted 0 times
...
Pamella
5 months ago
Oops, looks like they made a mistake in the solution. It should be port 9000, not 8080.
upvoted 0 times
...
...
Elinore
6 months ago
Wait, aren't we supposed to allow access to port 9000, not 8080? I think I see a typo in the solution.
upvoted 0 times
Jesusa
5 months ago
Let's update the network.yaml file to specify port 9000 instead of 8080. That should fix the issue.
upvoted 0 times
...
Talia
5 months ago
You're right, there seems to be a mistake in the solution. We should allow access to port 9000, not 8080.
upvoted 0 times
...
...
Elli
6 months ago
I think the key is to carefully follow the instructions and use the provided solution as a guide.
upvoted 0 times
...
Anissa
6 months ago
I agree, creating a new NetworkPolicy can be challenging.
upvoted 0 times
...
Yun
6 months ago
This question seems tricky.
upvoted 0 times
...
Christa
6 months ago
Hmm, the question seems straightforward enough, but I'm a bit confused about the namespace part. Shouldn't it be 'echo' instead of 'internal'?
upvoted 0 times
Hannah
5 months ago
Make sure to update the namespace in the NetworkPolicy to 'echo' for it to work correctly.
upvoted 0 times
...
Billy
5 months ago
Yes, the namespace in the NetworkPolicy should match the existing namespace 'echo'.
upvoted 0 times
...
Curt
5 months ago
You're right, the namespace should be 'echo' instead of 'internal'.
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77