Skip to content

Commit 4f3e41d

Browse files
Merge pull request #287768 from varunkalyana/patch-3
Azure Firewall - protect AKS clusters (Update the doc to remove personal name)
2 parents 73eb1d9 + 920490b commit 4f3e41d

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/firewall/protect-azure-kubernetes-service.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ However, in a production environment, communications with a Kubernetes cluster s
2626

2727
The simplest solution uses a firewall device that can control outbound traffic based on domain names. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet. Azure Firewall, for example, can restrict outbound HTTP and HTTPS traffic based on the FQDN of the destination, giving you fine-grained egress traffic control, but at the same time allows you to provide access to the FQDNs encompassing an AKS cluster’s outbound dependencies (something that NSGs can't do). Likewise, you can control ingress traffic and improve security by enabling threat intelligence-based filtering on an Azure Firewall deployed to a shared perimeter network. This filtering can provide alerts, and deny traffic to and from known malicious IP addresses and domains.
2828

29-
See the following video by Abhinav Sriram for a quick overview on how this works in practice on a sample environment:
29+
See the following video for a quick overview on how this works in practice on a sample environment:
3030

3131
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE529Qc]
3232

0 commit comments

Comments
 (0)