Generates Kubernetes NetworkPolicy manifests for zero-trust networking, ingress/egress rules using pod labels, namespaces, CIDRs, and ports.
npx claudepluginhub jeremylongshore/claude-code-plugins-plus-skills --plugin network-policy-managerThis skill is limited to using the following tools:
Create and manage Kubernetes NetworkPolicy manifests to enforce zero-trust networking between pods, namespaces, and external endpoints. Generate ingress and egress rules with label selectors, namespace selectors, CIDR blocks, and port specifications following the principle of least privilege.
Implements Kubernetes NetworkPolicies for pod-level network segmentation with default deny-all, DNS egress, and app-specific ingress rules. Secures traffic between pods, namespaces, and endpoints.
Implements Kubernetes NetworkPolicies for pod traffic segmentation with YAML for default deny, DNS egress, and service-to-service rules using Calico/Cilium CNIs.
Implements Kubernetes NetworkPolicies for Pod-level network segmentation, enforcing least-privilege communication, zero-trust access, and restricting lateral movement in clusters with Calico or Cilium.
Share bugs, ideas, or general feedback.
Create and manage Kubernetes NetworkPolicy manifests to enforce zero-trust networking between pods, namespaces, and external endpoints. Generate ingress and egress rules with label selectors, namespace selectors, CIDR blocks, and port specifications following the principle of least privilege.
kubectl configured with permissions to create and manage NetworkPolicy resourceskube-system namespace on UDP/TCP port 53 for CoreDNSkubectl exec curl/wget commandscalicoctl node status, Cilium: cilium monitor)| Error | Cause | Solution |
|---|---|---|
All traffic blocked after applying policy | Default-deny applied without corresponding allow rules | Apply allow rules before or simultaneously with deny policies; verify with kubectl exec tests |
DNS resolution fails after network policy | Missing egress rule for kube-dns/CoreDNS | Add egress policy allowing UDP and TCP port 53 to kube-system namespace |
Policy not targeting intended pods | Label mismatch between policy selector and pod labels | Verify labels with kubectl get pods --show-labels; match selectors exactly |
Traffic still allowed despite deny policy | CNI plugin does not support NetworkPolicy or policy in wrong namespace | Verify CNI support with kubectl get networkpolicy -A; ensure policy is in the correct namespace |
Intermittent connection failures | Policy allows traffic but connection pool or timeout settings too aggressive | Check if the issue is network policy or application-level; test with kubectl exec during failures |
production namespace, then add allow rules so only the ingress controller can reach web pods on port 443."