Cross cluster comms using custom fqdn with AuthorizationPolicy


Testing something out and I want to see if its achievable.

I have a service on k8s cluster1 called testservice01. This is accessible from outside kubenetes as

Can I also make it accesable to pods on k8s cluster2 via it’s fqdn while applying authorization policys?

The end result I want is that everyone who is allowed to connects to the service via but only specific namespaces on k8s cluster2 are allowed to (say namespace1, namespace2 and namespace4).

Any advice?