You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/limit-egress-traffic.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,16 +1,16 @@
1
1
---
2
-
title: Control egress traffic using Azure Firewall in Azure Kubernetes Service (AKS)
3
-
description: Learn how to control egress traffic using Azure Firewall in Azure Kubernetes Service (AKS)
2
+
title: Limit Network Traffic with Azure Firewall in Azure Kubernetes Service (AKS)
3
+
description: Learn how to control egress traffic with Azure Firewall to set restrictions for outbound network connections in AKS clusters.
4
4
ms.subservice: aks-networking
5
5
ms.custom: devx-track-azurecli, devx-track-linux
6
6
ms.topic: how-to
7
7
ms.author: allensu
8
-
ms.date: 03/10/2023
8
+
ms.date: 12/05/2023
9
9
author: asudbring
10
10
#Customer intent: As a cluster operator, I want to restrict egress traffic for nodes to only access defined ports and addresses and improve cluster security.
11
11
---
12
12
13
-
# Control egress traffic using Azure Firewall in Azure Kubernetes Service (AKS)
13
+
# Limit Network Traffic with Azure Firewall in Azure Kubernetes Service (AKS)
14
14
15
15
This article provides a walkthrough of how to use the [Outbound network and FQDN rules for AKS clusters][outbound-fqdn-rules] to control egress traffic using Azure Firewall in AKS. To simplify this configuration, Azure Firewall provides an Azure Kubernetes Service (`AzureKubernetesService`) FQDN that restricts outbound traffic from the AKS cluster. This article also provides an example of how to configure public inbound traffic via the firewall.
16
16
@@ -36,7 +36,7 @@ The following information provides an example architecture of the deployment:
36
36
***Internal traffic**
37
37
* You can use an [internal load balancer](internal-lb.md) for internal traffic, which you could isolate on its own subnet, instead of or alongside a [public load balancer](load-balancer-standard.md)
38
38
39
-
## Set configuration using environment variables
39
+
## Configure environment variables
40
40
41
41
Define a set of environment variables to be used in resource creations.
42
42
@@ -90,7 +90,7 @@ Provision a virtual network with two separate subnets: one for the cluster and o
90
90
--address-prefix 10.42.2.0/24
91
91
```
92
92
93
-
## Create and set up an Azure Firewall with a UDR
93
+
## Create and set up an Azure Firewall
94
94
95
95
You need to configure Azure Firewall inbound and outbound rules. The main purpose of the firewall is to enable organizations to configure granular ingress and egress traffic rules into and out of the AKS cluster.
96
96
@@ -212,7 +212,7 @@ To associate the cluster with the firewall, the dedicated subnet for the cluster
## Deploy an AKS cluster with a UDR outbound type to the existing network
215
+
## Deploy an AKS cluster that follows your outbound rules
216
216
217
217
Now, you can deploy an AKS cluster into the existing virtual network. You will use the [`userDefinedRouting` outbound type](egress-outboundtype.md), which ensures that any outbound traffic is forced through the firewall and no other egress paths will exist. The [`loadBalancer` outbound type](egress-outboundtype.md#outbound-type-of-loadbalancer) can also be used.
218
218
@@ -346,7 +346,7 @@ If you used authorized IP ranges for your cluster in the previous step, you need
346
346
az aks get-credentials -g $RG -n $AKSNAME
347
347
```
348
348
349
-
## Deploy a public service
349
+
## Deploy a public service on AKS
350
350
351
351
You can now start exposing services and deploying applications to this cluster. In this example, we'll expose a public service, but you also might want to expose an internal service using an [internal load balancer](internal-lb.md).
352
352
@@ -360,7 +360,7 @@ You can now start exposing services and deploying applications to this cluster.
0 commit comments