Skip to content

Commit 4568a54

Browse files
Rename UDR terms, metadata updates.
1 parent 53cf2bb commit 4568a54

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/aks/limit-egress-traffic.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
11
---
2-
title: Control egress traffic using Azure Firewall in Azure Kubernetes Service (AKS)
3-
description: Learn how to control egress traffic using Azure Firewall in Azure Kubernetes Service (AKS)
2+
title: Limit Network Traffic with Azure Firewall in Azure Kubernetes Service (AKS)
3+
description: Learn how to control egress traffic with Azure Firewall to set restrictions for outbound network connections in AKS clusters.
44
ms.subservice: aks-networking
55
ms.custom: devx-track-azurecli, devx-track-linux
66
ms.topic: how-to
77
ms.author: allensu
8-
ms.date: 03/10/2023
8+
ms.date: 12/05/2023
99
author: asudbring
1010
#Customer intent: As a cluster operator, I want to restrict egress traffic for nodes to only access defined ports and addresses and improve cluster security.
1111
---
1212

13-
# Control egress traffic using Azure Firewall in Azure Kubernetes Service (AKS)
13+
# Limit Network Traffic with Azure Firewall in Azure Kubernetes Service (AKS)
1414

1515
This article provides a walkthrough of how to use the [Outbound network and FQDN rules for AKS clusters][outbound-fqdn-rules] to control egress traffic using Azure Firewall in AKS. To simplify this configuration, Azure Firewall provides an Azure Kubernetes Service (`AzureKubernetesService`) FQDN that restricts outbound traffic from the AKS cluster. This article also provides an example of how to configure public inbound traffic via the firewall.
1616

@@ -36,7 +36,7 @@ The following information provides an example architecture of the deployment:
3636
* **Internal traffic**
3737
* You can use an [internal load balancer](internal-lb.md) for internal traffic, which you could isolate on its own subnet, instead of or alongside a [public load balancer](load-balancer-standard.md)
3838

39-
## Set configuration using environment variables
39+
## Configure environment variables
4040

4141
Define a set of environment variables to be used in resource creations.
4242

@@ -90,7 +90,7 @@ Provision a virtual network with two separate subnets: one for the cluster and o
9090
--address-prefix 10.42.2.0/24
9191
```
9292
93-
## Create and set up an Azure Firewall with a UDR
93+
## Create and set up an Azure Firewall
9494
9595
You need to configure Azure Firewall inbound and outbound rules. The main purpose of the firewall is to enable organizations to configure granular ingress and egress traffic rules into and out of the AKS cluster.
9696
@@ -212,7 +212,7 @@ To associate the cluster with the firewall, the dedicated subnet for the cluster
212212
az network vnet subnet update -g $RG --vnet-name $VNET_NAME --name $AKSSUBNET_NAME --route-table $FWROUTE_TABLE_NAME
213213
```
214214

215-
## Deploy an AKS cluster with a UDR outbound type to the existing network
215+
## Deploy an AKS cluster that follows your outbound rules
216216

217217
Now, you can deploy an AKS cluster into the existing virtual network. You will use the [`userDefinedRouting` outbound type](egress-outboundtype.md), which ensures that any outbound traffic is forced through the firewall and no other egress paths will exist. The [`loadBalancer` outbound type](egress-outboundtype.md#outbound-type-of-loadbalancer) can also be used.
218218

@@ -346,7 +346,7 @@ If you used authorized IP ranges for your cluster in the previous step, you need
346346
az aks get-credentials -g $RG -n $AKSNAME
347347
```
348348
349-
## Deploy a public service
349+
## Deploy a public service on AKS
350350
351351
You can now start exposing services and deploying applications to this cluster. In this example, we'll expose a public service, but you also might want to expose an internal service using an [internal load balancer](internal-lb.md).
352352
@@ -360,7 +360,7 @@ You can now start exposing services and deploying applications to this cluster.
360360
kubectl apply -f https://raw.githubusercontent.com/Azure-Samples/aks-store-demo/main/aks-store-quickstart.yaml
361361
```
362362

363-
## Add a DNAT rule to Azure Firewall
363+
## Allow inbound traffic through Azure Firewall
364364

365365
> [!IMPORTANT]
366366
>

0 commit comments

Comments
 (0)