Calico Whisker & Staged Network Policies: Secure Kubernetes Workloads Without Downtime
Link⚡ TL;DR
📝 Summary
Deploying a Kubernetes Cluster Deploying the yaobank Application Installing Calico for Policy Connect to Whisker UI Deploy Staged Network Policy Summary Rolling out network policies in a live Kubernetes cluster can feel like swapping wings mid-flight—one typo or overly broad rule and critical traffic is grounded. Calico’s Staged Network Policies remove the turbulence by letting you deploy policies in staged mode, so you can observe their impact before enforcing anything. Add Whisker , the open-source policy enforcement and testing tool (introduced as part of Calico Open Source 3.30 ) that captures every flow and tags it with a policy verdict, and you’ve got a safety harness that proves your change is sound long before you flip the switch. In this post, we’ll walk you through how you can leverage these capabilities to tighten security, validate intent, and ship changes confidently—without a single packet of downtime. Calico for Policy is a CNI agnostic tool. Refer to the Calico Open Source docs for a list of supported CNIs. The git repository for this blog post can be found here. For this post, let’s deploy a simple AKS cluster with Azure CNI. ## Configure az group create --name calicooss --location eastus2 ## Create a 3 node AKS cluster with Azure CNI az aks create --resource-group calicooss --name calico-whisker --node-count 3 --network-plugin azure --kubernetes-version 1.31.8 ## Retrieve the kubeconfig file az aks get-credentials --resource-group calicooss --name calico-whisker Now that our cluster is deployed. Let’s provision a demo application. yaobank For this post, we will deploy a three-tier web application called “yet-another-bank” (yaobank). The manifest for the application can be found at this link.