Skip to content

Commit 35a6972

Browse files
authored
Merge pull request #230305 from schaffererin/restrict-egress-aks
Rearchitect existing egress AKS doc
2 parents 1a2c3ac + 0c40b0a commit 35a6972

14 files changed

+691
-698
lines changed

articles/aks/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -427,7 +427,9 @@
427427
href: coredns-custom.md
428428
- name: Egress
429429
items:
430-
- name: Restrict and control cluster egress traffic
430+
- name: Outbound network and FQDN rules for AKS clusters
431+
href: outbound-rules-control-egress.md
432+
- name: Control cluster egress traffic using Azure Firewall
431433
href: limit-egress-traffic.md
432434
- name: Configure outbound type for AKS
433435
href: egress-outboundtype.md

articles/aks/egress-udr.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Azure load balancers [don't incur a charge until a rule is placed](https://azure
4242

4343
## Deploy a cluster with outbound type of UDR and Azure Firewall
4444

45-
To illustrate the application of a cluster with outbound type using a user-defined route, a cluster can be configured on a virtual network with an Azure Firewall on its own subnet. See this example on the [restrict egress traffic with Azure firewall example](limit-egress-traffic.md#restrict-egress-traffic-using-azure-firewall).
45+
To illustrate the application of a cluster with outbound type using a user-defined route, a cluster can be configured on a virtual network with an Azure Firewall on its own subnet. See this example on the [restrict egress traffic with Azure firewall example](limit-egress-traffic.md).
4646

4747
> [!IMPORTANT]
4848
> Outbound type of UDR requires there is a route for 0.0.0.0/0 and next hop destination of NVA (Network Virtual Appliance) in the route table.

articles/aks/keda-deploy-add-on-arm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ You can troubleshoot KEDA add-on problems in [this article][keda-troubleshoot].
165165
[az aks update]: /cli/azure/aks#az-aks-update
166166
[az-group-delete]: /cli/azure/group#az-group-delete
167167
[keda-troubleshoot]: /troubleshoot/azure/azure-kubernetes/troubleshoot-kubernetes-event-driven-autoscaling-add-on?context=/azure/aks/context/aks-context
168-
[aks-firewall-requirements]: limit-egress-traffic.md#azure-global-required-network-rules
168+
[aks-firewall-requirements]: outbound-rules-control-egress.md#azure-global-required-network-rules
169169
[az-provider-register]: /cli/azure/provider#az-provider-register
170170
[az-feature-register]: /cli/azure/feature#az-feature-register
171171
[az-feature-show]: /cli/azure/feature#az-feature-show

articles/aks/keda-deploy-add-on-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -182,7 +182,7 @@ You can troubleshoot KEDA add-on problems in [this article][keda-troubleshoot].
182182
[az aks update]: /cli/azure/aks#az-aks-update
183183
[az-group-delete]: /cli/azure/group#az-group-delete
184184
[keda-troubleshoot]: /troubleshoot/azure/azure-kubernetes/troubleshoot-kubernetes-event-driven-autoscaling-add-on?context=/azure/aks/context/aks-context
185-
[aks-firewall-requirements]: limit-egress-traffic.md#azure-global-required-network-rules
185+
[aks-firewall-requirements]: outbound-rules-control-egress.md#azure-global-required-network-rules
186186

187187
[kubectl]: https://kubernetes.io/docs/user-guide/kubectl
188188
[keda]: https://keda.sh/

articles/aks/limit-egress-traffic.md

Lines changed: 440 additions & 684 deletions
Large diffs are not rendered by default.

articles/aks/outbound-rules-control-egress.md

Lines changed: 235 additions & 0 deletions
Large diffs are not rendered by default.

articles/backup/azure-kubernetes-service-backup-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ The extension pods aren't exempt, and require the Azure Active Directory (Azure
7474
```Error
7575
{"Message":"Error in the getting the Configurations: error {Post \https://centralus.dp.kubernetesconfiguration.azure.com/subscriptions/ subscriptionid /resourceGroups/ aksclusterresourcegroup /provider/managedclusters/clusters/ aksclustername /configurations/getPendingConfigs?api-version=2021-11-01\: dial tcp: lookup centralus.dp.kubernetesconfiguration.azure.com on 10.63.136.10:53: no such host}","LogType":"ConfigAgentTrace","LogLevel":"Error","Environment":"prod","Role":"ClusterConfigAgent","Location":"centralus","ArmId":"/subscriptions/ subscriptionid /resourceGroups/ aksclusterresourcegroup /providers/Microsoft.ContainerService/managedclusters/ aksclustername ","CorrelationId":"","AgentName":"ConfigAgent","AgentVersion":"1.8.14","AgentTimestamp":"2023/01/19 20:24:16"}`
7676
```
77-
**Cause**: Specific FQDN/application rules are required to use cluster extensions in the AKS clusters. [Learn more](../aks/limit-egress-traffic.md#cluster-extensions).
77+
**Cause**: Specific FQDN/application rules are required to use cluster extensions in the AKS clusters. [Learn more](../aks/outbound-rules-control-egress.md#cluster-extensions).
7878

7979
This error appears due to absence of these FQDN rules because of which configuration information from the Cluster Extensions service wasn't available.
8080

articles/backup/azure-kubernetes-service-cluster-backup-concept.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,9 @@ ms.author: jsuri
1010

1111
# Prerequisites for Azure Kubernetes Service backup using Azure Backup (preview)
1212

13-
This article describes the prerequisites for Azure Kubernetes Sercuce (AKS) backup.
13+
This article describes the prerequisites for Azure Kubernetes Service (AKS) backup.
1414

15-
Azure Backup now allows you to back up AKS clusters (cluster resources and persistent volumes attached to the cluster) using a backup extension, which must be installed in the cluster. Backup vault communicates with the cluster via this Backup Extension to perform backup and restore operations. Based on the least privileged security model, a Backup vault must have *Trusted Access* enabled to communicate with the AKS cluster.
15+
Azure Backup now allows you to back up AKS clusters (cluster resources and persistent volumes attached to the cluster) using a backup extension, which must be installed in the cluster. Backup vault communicates with the cluster via this Backup Extension to perform backup and restore operations. Based on the least privileged security model, a Backup vault must have *Trusted Access* enabled to communicate with the AKS cluster.
1616

1717
## Backup Extension
1818

@@ -66,7 +66,7 @@ To enable backup for an AKS cluster, see the following prerequisites: .
6666
6767
- The Backup Extension during installation fetches Container Images stored in Microsoft Container Registry (MCR). If you enable a firewall on the AKS cluster, the extension installation process might fail due to access issues on the Registry. Learn [how to allow MCR access from the firewall](../container-registry/container-registry-firewall-access-rules.md#configure-client-firewall-rules-for-mcr).
6868

69-
- Install Backup Extension on the AKS clusters following the [required FQDN/application rules](../aks/limit-egress-traffic.md#required-fqdn--application-rules-6).
69+
- Install Backup Extension on the AKS clusters following the [required FQDN/application rules](../aks/outbound-rules-control-egress.md).
7070

7171
- If you've any previous installation of *Velero* in the AKS cluster, you need to delete it before installing Backup Extension.
7272

articles/container-registry/container-registry-troubleshoot-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ Related links:
103103
* [Connect privately to an Azure container registry using Azure Private Link](container-registry-private-link.md)
104104
* [Troubleshoot Azure Private Endpoint connectivity problems](../private-link/troubleshoot-private-endpoint-connectivity.md)
105105
* [Restrict access to a container registry using a service endpoint in an Azure virtual network](container-registry-vnet.md)
106-
* [Required outbound network rules and FQDNs for AKS clusters](../aks/limit-egress-traffic.md#required-outbound-network-rules-and-fqdns-for-aks-clusters)
106+
* [Required outbound network rules and FQDNs for AKS clusters](../aks/outbound-rules-control-egress.md#required-outbound-network-rules-and-fqdns-for-aks-clusters)
107107
* [Kubernetes: Debugging DNS resolution](https://kubernetes.io/docs/tasks/administer-cluster/dns-debugging-resolution/)
108108
* [Virtual network service tags](../virtual-network/service-tags-overview.md)
109109

articles/defender-for-cloud/defender-for-containers-architecture.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ The **Azure Policy add-on for Kubernetes** collects cluster and workload configu
5151
|--|--|--|--|--|--|--|
5252
| microsoft-defender-collector-ds-* | kube-system | [DaemonSet](https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/) | A set of containers that focus on collecting inventory and security events from the Kubernetes environment. | SYS_ADMIN, <br>SYS_RESOURCE, <br>SYS_PTRACE | memory: 296Mi<br> <br> cpu: 360m | No |
5353
| microsoft-defender-collector-misc-* | kube-system | [Deployment](https://kubernetes.io/docs/concepts/workloads/controllers/deployment/) | A set of containers that focus on collecting inventory and security events from the Kubernetes environment that aren't bounded to a specific node. | N/A | memory: 64Mi <br> <br>cpu: 60m | No |
54-
| microsoft-defender-publisher-ds-* | kube-system | [DaemonSet](https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/) | Publish the collected data to Microsoft Defender for Containers backend service where the data will be processed for and analyzed. | N/A | memory: 200Mi  <br> <br> cpu: 60m | Https 443 <br> <br> Learn more about the [outbound access prerequisites](../aks/limit-egress-traffic.md#microsoft-defender-for-containers) |
54+
| microsoft-defender-publisher-ds-* | kube-system | [DaemonSet](https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/) | Publish the collected data to Microsoft Defender for Containers backend service where the data will be processed for and analyzed. | N/A | memory: 200Mi  <br> <br> cpu: 60m | Https 443 <br> <br> Learn more about the [outbound access prerequisites](../aks/outbound-rules-control-egress.md#microsoft-defender-for-containers) |
5555

5656
\* Resource limits aren't configurable; Learn more about [Kubernetes resources limits](https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/#resource-units-in-kubernetes)
5757

0 commit comments

Comments
 (0)