Cross cluster comms using custom fqdn with AuthorizationPolicy

HI

Testing something out and I want to see if its achievable.

I have a service on k8s cluster1 called testservice01. This is accessible from outside kubenetes as testservice01.domain.com.

Can I also make it accesable to pods on k8s cluster2 via it’s fqdn while applying authorization policys?

The end result I want is that everyone who is allowed to connects to the service via testservice01.domain.com but only specific namespaces on k8s cluster2 are allowed to (say namespace1, namespace2 and namespace4).

Any advice?

Thanks

R