IBM Cloud Docs
Common networking configuration issues

Common networking configuration issues

IBM Cloud® Security and Compliance Center Workload Protection provides a configuration page for administrators to fine-tune the way that the agent processes network data. The following are common configuration messages and how you can resolve the issues.

Namespaces without labels

Namespaces must be labeled for Kubernetes Network Policies (KNPs) to define ingress and egress rules.

If a namespace is not labeled, an error is displayed in the network security policy tool.

For example, if the Kube-system namespace is missing labels, you get the following error message:

All communications are displayed as allowed because a policy can't be generated: you need to assign labels to this namespace.: kube-system

To resolve this issue, assign a label to the namespace. It will take a few minutes for the change to be detected by IBM Cloud Security and Compliance Center Workload Protection.

Cluster subnet is incomplete

To categorize unresolved IP addresses as being inside of outside a cluster, the agent needs to know the CIDR block ranges belonging to the cluster. By default the agent looks at the kube-apiserver and kube-controller-manager processes.

If the cluster subnets cannot be discovered automatically, a message that the cluster subnet is incomplete is displayed in the network security policy tool.

To resolve this issue, configure CIDR block entries for your environment.

If configuring CIDR block entries for your environment doesn't resolve the issue, you might need to configure the agent to look for CIDR block ranges in other processes. Add the following to your agent configmap file:

network_topology:
  pod_prefix_for_cidr_retrieval:
[<PROCESS_NAME>, <PROCESS_NAME>]

Where PROCESS_NAME is the name of the process to be searched.