I have read
https://kubernetes.io/docs/tasks/administer-cluster/securing-a-cluster/#restricting-network-access but I'm still left with some questions.
I'm using Google Cloud and I was able to create a Kubernetes cluster, persistent pods, services, replica sets, ingress LB etc.
I was able to access a pod above which I had created a service + ingress from the internet. On every machine I was able to visit it.
Now I only want this pod to be accessible from one network. But the pod itself need access to the internet. For example a jenkins instance. It's something which companies keep private but it needs access (maybe through a proxy) to the internet.
What is the best or recommended way to create such a setup in Google Cloud? I can probably do this with firewalling but isn't there a recommended/better/easier way than writing firewall rules?