Skip to content

Commit 72dc23c

Browse files
Merge pull request #260512 from nathaniel-msft/aks-firewall
AKS firewall traffic docs minor changes
2 parents 4b27542 + 7b55473 commit 72dc23c

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

articles/aks/limit-egress-traffic.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,18 @@
11
---
2-
title: Control egress traffic using Azure Firewall in Azure Kubernetes Service (AKS)
3-
description: Learn how to control egress traffic using Azure Firewall in Azure Kubernetes Service (AKS)
2+
title: Limit Network Traffic with Azure Firewall in Azure Kubernetes Service (AKS)
3+
description: Learn how to control egress traffic with Azure Firewall to set restrictions for outbound network connections in AKS clusters.
44
ms.subservice: aks-networking
55
ms.custom: devx-track-azurecli, devx-track-linux
66
ms.topic: how-to
77
ms.author: allensu
8-
ms.date: 03/10/2023
8+
ms.date: 12/05/2023
99
author: asudbring
1010
#Customer intent: As a cluster operator, I want to restrict egress traffic for nodes to only access defined ports and addresses and improve cluster security.
1111
---
1212

13-
# Control egress traffic using Azure Firewall in Azure Kubernetes Service (AKS)
13+
# Limit network traffic with Azure Firewall in Azure Kubernetes Service (AKS)
1414

15-
This article provides a walkthrough of how to use the [Outbound network and FQDN rules for AKS clusters][outbound-fqdn-rules] to control egress traffic using Azure Firewall in AKS. To simplify this configuration, Azure Firewall provides an Azure Kubernetes Service (`AzureKubernetesService`) FQDN that restricts outbound traffic from the AKS cluster. This article also provides an example of how to configure public inbound traffic via the firewall.
15+
Learn how to use the [Outbound network and FQDN rules for AKS clusters][outbound-fqdn-rules] to control egress traffic using the Azure Firewall in AKS. To simplify this configuration, Azure Firewall provides an Azure Kubernetes Service (`AzureKubernetesService`) Fully Qualified Domain Name (FQDN) tag that restricts outbound traffic from the AKS cluster. This article shows how you can configure your AKS Cluster traffic rules through Azure firewall.
1616

1717
> [!NOTE]
1818
>
@@ -36,7 +36,7 @@ The following information provides an example architecture of the deployment:
3636
* **Internal traffic**
3737
* You can use an [internal load balancer](internal-lb.md) for internal traffic, which you could isolate on its own subnet, instead of or alongside a [public load balancer](load-balancer-standard.md)
3838

39-
## Set configuration using environment variables
39+
## Configure environment variables
4040

4141
Define a set of environment variables to be used in resource creations.
4242

@@ -90,7 +90,7 @@ Provision a virtual network with two separate subnets: one for the cluster and o
9090
--address-prefix 10.42.2.0/24
9191
```
9292
93-
## Create and set up an Azure Firewall with a UDR
93+
## Create and set up an Azure Firewall
9494
9595
You need to configure Azure Firewall inbound and outbound rules. The main purpose of the firewall is to enable organizations to configure granular ingress and egress traffic rules into and out of the AKS cluster.
9696
@@ -108,7 +108,7 @@ You need to configure Azure Firewall inbound and outbound rules. The main purpos
108108
az network public-ip create -g $RG -n $FWPUBLICIP_NAME -l $LOC --sku "Standard"
109109
```
110110
111-
2. Register the [Azure Firewall preview CLI extension](https://github.com/Azure/azure-cli-extensions/tree/main/src/azure-firewall) to create an Azure Firewall using the [`az extension add`][az-extension-add] command.
111+
2. Register the [Azure Firewall CLI extension](https://github.com/Azure/azure-cli-extensions/tree/main/src/azure-firewall) to create an Azure Firewall using the [`az extension add`][az-extension-add] command.
112112
113113
```azurecli-interactive
114114
az extension add --name azure-firewall
@@ -143,12 +143,12 @@ You need to configure Azure Firewall inbound and outbound rules. The main purpos
143143
>
144144
> If you use secure access to the AKS API server with [authorized IP address ranges](./api-server-authorized-ip-ranges.md), you need to add the firewall public IP into the authorized IP range.
145145
146-
### Create a UDR with a hop to Azure Firewall
146+
### Create a route with a hop to Azure Firewall
147147
148148
Azure automatically routes traffic between Azure subnets, virtual networks, and on-premises networks. If you want to change any of Azure's default routing, you can create a route table.
149149
150150
> [!IMPORTANT]
151-
> Outbound type of UDR requires a route for 0.0.0.0/0 and a next hop destination of NVA in the route table.
151+
> Outbound type of UDR (`userDefinedRouting`) requires a route for 0.0.0.0/0 and a next hop destination of NVA in the route table.
152152
> The route table already has a default 0.0.0.0/0 to the Internet. Without a public IP address for Azure to use for Source Network Address Translation (SNAT), simply adding this route won't provide you outbound Internet connectivity. AKS validates that you don't create a 0.0.0.0/0 route pointing to the Internet but instead to a gateway, NVA, etc.
153153
> When using an outbound type of UDR, a load balancer public IP address for **inbound requests** isn't created unless you configure a service of type *loadbalancer*. AKS never creates a public IP address for **outbound requests** if you set an outbound type of UDR.
154154
> For more information, see [Outbound rules for Azure Load Balancer](../load-balancer/outbound-rules.md#scenario6out).
@@ -212,7 +212,7 @@ To associate the cluster with the firewall, the dedicated subnet for the cluster
212212
az network vnet subnet update -g $RG --vnet-name $VNET_NAME --name $AKSSUBNET_NAME --route-table $FWROUTE_TABLE_NAME
213213
```
214214

215-
## Deploy an AKS cluster with a UDR outbound type to the existing network
215+
## Deploy an AKS cluster that follows your outbound rules
216216

217217
Now, you can deploy an AKS cluster into the existing virtual network. You will use the [`userDefinedRouting` outbound type](egress-outboundtype.md), which ensures that any outbound traffic is forced through the firewall and no other egress paths will exist. The [`loadBalancer` outbound type](egress-outboundtype.md#outbound-type-of-loadbalancer) can also be used.
218218

@@ -346,7 +346,7 @@ If you used authorized IP ranges for your cluster in the previous step, you need
346346
az aks get-credentials -g $RG -n $AKSNAME
347347
```
348348
349-
## Deploy a public service
349+
## Deploy a public service on AKS
350350
351351
You can now start exposing services and deploying applications to this cluster. In this example, we'll expose a public service, but you also might want to expose an internal service using an [internal load balancer](internal-lb.md).
352352
@@ -360,7 +360,7 @@ You can now start exposing services and deploying applications to this cluster.
360360
kubectl apply -f https://raw.githubusercontent.com/Azure-Samples/aks-store-demo/main/aks-store-quickstart.yaml
361361
```
362362

363-
## Add a DNAT rule to Azure Firewall
363+
## Allow inbound traffic through Azure Firewall
364364

365365
> [!IMPORTANT]
366366
>

0 commit comments

Comments
 (0)