Initial description of the problem in JIRA (netobserv project/team) : https://issues.redhat.com/browse/NETOBSERV-172 Description of problem: When user is logged as as developer/non-admin, they only have access to their own projects by default. When creating a network policy: 1. Add Ingress/Egress rule 2. Select "Allow traffic from pods inside the cluster" 3. When clicked on the "affected pods", the pop up shows empty and the console shows 403 (Forbidden), because user doesn't have privileges to see pods of projects that in rest of the cluster.
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Important: OpenShift Container Platform 4.11.0 bug fix and security update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2022:5069