You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/api-server-authorized-ip-ranges.md
+12-13Lines changed: 12 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: API server authorized IP ranges in Azure Kubernetes Service (AKS)
3
3
description: Learn how to secure your cluster using an IP address range for access to the API server in Azure Kubernetes Service (AKS)
4
4
services: container-service
5
5
ms.topic: article
6
-
ms.date: 09/21/2020
6
+
ms.date: 06/20/2022
7
7
8
8
9
9
#Customer intent: As a cluster operator, I want to increase the security of my cluster by limiting access to the API server to only the IP addresses that I specify.
@@ -13,13 +13,13 @@ ms.date: 09/21/2020
13
13
14
14
In Kubernetes, the API server receives requests to perform actions in the cluster such as to create resources or scale the number of nodes. The API server is the central way to interact with and manage a cluster. To improve cluster security and minimize attacks, the API server should only be accessible from a limited set of IP address ranges.
15
15
16
-
This article shows you how to use API server authorized IP address ranges to limit which IP addresses and CIDRs can access control plane.
16
+
This article shows you how to use API server authorized IP address ranges, using the Azure CLI, to limit which IP addresses and CIDRs can access control plane.
17
17
18
18
## Before you begin
19
19
20
-
This article shows you how to create an AKS cluster using the Azure CLI.
20
+
- You need the Azure CLI version 2.0.76 or later installed and configured. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI][install-azure-cli].
21
21
22
-
You need the Azure CLI version 2.0.76 or later installed and configured. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI][install-azure-cli].
22
+
- To learn what IP addresses to include when integrating your AKS cluster with Azure DevOps, see the Azure DevOps [Allowed IP addresses and domain URLs][azure-devops-allowed-network-cfg] article.
23
23
24
24
### Limitations
25
25
@@ -62,7 +62,7 @@ az aks create \
62
62
>
63
63
> The upper limit for the number of IP ranges you can specify is 200.
64
64
>
65
-
> The rules can take up to 2min to propagate. Please allow up to that time when testing the connection.
65
+
> The rules can take up to two minutes to propagate. Please allow up to that time when testing the connection.
66
66
67
67
### Specify the outbound IPs for the Standard SKU load balancer
68
68
@@ -146,9 +146,9 @@ The above operations of adding, updating, finding, and disabling authorized IP r
146
146
147
147
## How to find my IP to include in `--api-server-authorized-ip-ranges`?
148
148
149
-
You must add your development machines, tooling or automation IP addresses to the AKS cluster list of approved IP ranges in order to access the API server from there.
149
+
You must add your development machines, tooling or automation IP addresses to the AKS cluster list of approved IP ranges in order to access the API server from there.
150
150
151
-
Another option is to configure a jumpbox with the needed tooling inside a separate subnet in the Firewall's virtual network. This assumes your environment has a Firewall with the respective network, and you have added the Firewall IPs to authorized ranges. Similarly, if you have forced tunneling from the AKS subnet to the Firewall subnet, than having the jumpbox in the cluster subnet is fine too.
151
+
Another option is to configure a jumpbox with the necessary tooling inside a separate subnet in the firewall's virtual network. This assumes your environment has a firewall with the respective network, and you have added the firewall IPs to authorized ranges. Similarly, if you have forced tunneling from the AKS subnet to the firewall subnet, than having the jumpbox in the cluster subnet is also okay.
152
152
153
153
Add another IP address to the approved ranges with the following command.
154
154
@@ -163,21 +163,19 @@ az aks update -g $RG -n $AKSNAME --api-server-authorized-ip-ranges $CURRENT_IP/3
163
163
```
164
164
165
165
> [!NOTE]
166
-
> The above example appends the API server authorized IP ranges on the cluster. To disable authorized IP ranges, use az aks update and specify an empty range "".
166
+
> The above example appends the API server authorized IP ranges on the cluster. To disable authorized IP ranges, use `az aks update` and specify an empty range "".
167
167
168
-
Another option is to use the below command on Windows systems to get the public IPv4 address, or you can use the steps in [Find your IP address](https://support.microsoft.com/en-gb/help/4026518/windows-10-find-your-ip-address).
168
+
Another option is to use the commandbelow on Windows systems to get the public IPv4 address, or you can follow the steps in [Find your IP address](https://support.microsoft.com/en-gb/help/4026518/windows-10-find-your-ip-address).
169
169
170
170
```azurepowershell-interactive
171
171
Invoke-RestMethod http://ipinfo.io/json | Select -exp ip
172
172
```
173
173
174
-
You can also find this address by searching "what is my IP address"in an internet browser.
174
+
You can also find this address by searching on *what is my IP address*in an internet browser.
175
175
176
176
## Next steps
177
177
178
-
In this article, you enabled API server authorized IP ranges. This approach is one part of how you can run a secure AKS cluster.
179
-
180
-
For more information, see [Security concepts forapplications and clustersin AKS][concepts-security] and [Best practices forcluster security and upgradesin AKS][operator-best-practices-cluster-security].
178
+
In this article, you enabled API server authorized IP ranges. This approach is one part of how you can securely run an AKS cluster. For more information, see [Security concepts forapplications and clustersin AKS][concepts-security] and [Best practices forcluster security and upgradesin AKS][operator-best-practices-cluster-security].
0 commit comments