Kubernetes Network Policy Allow Only HTTP Traffic to Your Web Application
    Real-World Use Case: Restricting inbound traffic to your web application by allowing only HTTP (port 80) ensures that no other ports are exposed, reducing the attack surface for potential malicious activities.
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
  name: allow-http
  namespace: default
spec:
  podSelector:
    matchLabels:
      app: web
  policyTypes:
  - Ingress
  ingress:
  - from:
    - podSelector: {}
    ports:
    - protocol: TCP
      port: 80
Testing the Policy:
Deploy a web pod:
kubectl run web --image=nginx --labels=app=web --port=80 --restart=Never
Deploy a test client pod:
kubectl run test-client --image=busybox --restart=Never -- sleep 3600
Access the test-client pod and try to access the web pod:
kubectl exec -it test-client -- sh
wget -qO- http://web-ip
Expected Result: The request should succeed because port 80 is open.
Deleting Pods and Network Policy:
kubectl delete pod web
kubectl delete pod test-client
kubectl delete networkpolicy allow-http -n default