Blenra LogoBlenra
Optimized for: Gemini / ChatGPT / Claude
#Kubernetes

Advanced AI Prompt for Kubernetes Zero-Trust NetworkPolicies

Customize the variables below to instantly engineer your prompt.

Required Variables

k8s-zero-trust-network-policy-generator.txt
Act as a Kubernetes Security Specialist (DevSecOps). Architect a strict Zero-Trust network perimeter utilizing Kubernetes NetworkPolicies within the '[NAMESPACE]' namespace. Step 1: Provide a foundational `default-deny-all` policy that blocks all unapproved ingress and egress traffic for every pod in the namespace. Step 2: Provide a highly specific, granular policy targeting pods identified by the label `app=[APP_LABEL]`. This specific policy must allow egress connections *only* to the external IP range defined by '[ALLOWED_CIDR]', and permit ingress connections *only* from pods holding the `tier=frontend` label, strictly isolated to TCP port '[DB_PORT]'. Do not rely on IP addresses for internal cluster routing; use namespace and pod selectors.

Example Text Output

"The AI will provide two NetworkPolicy YAMLs: one to lock down the namespace and another to allow specific, granular traffic based on your microservice labels."

More Cloud & DevOps Prompts

View all →

Frequently Asked Questions

What is the "Advanced AI Prompt for Kubernetes Zero-Trust NetworkPolicies" prompt used for?

The AI will provide two NetworkPolicy YAMLs: one to lock down the namespace and another to allow specific, granular traffic based on your microservice labels.

Which AI tools work with this prompt?

This prompt is optimized for Gemini / ChatGPT / Claude, but works great with ChatGPT, Claude, Gemini, and other large language models. Simply copy it and paste it into your preferred AI tool.

How do I customize this prompt?

Use the variable fields above to fill in your specific details. The prompt will auto-update as you type, ready to copy instantly.

Is this prompt free?

Yes! All prompts on Blenra are free to copy and use immediately. No account required.