Skip to main content

Securing your AKS cluster with a Linux Firewall VM

· 9 min read
Diego Casati
Principal Cloud Architect, Azure Global Black Belt

A network virtual appliance (NVA) is a virtual machine that performs network functions such as firewalling. In this post, I will walk you through how to use a Linux VM as an NVA in Azure and route traffic to an endpoint running on Azure Kubernetes Service (AKS). I will cover two scenarios: one where the traffic goes through an internal load balancer, and another where the traffic goes directly to a pod.

This assumes you already have a Linux VM and an AKS Cluster created - both in their own VNET. The cluster and the Linux VM need to be VNET peered already. Here is a quick start on VNET peering if you need a refresher.

Using External DNS in AKS with Azure Workload Identity

· 7 min read
Steve Griffith
Principal Cloud Architect, Azure Global Black Belt

The following walk-through shows how to use the External DNS project to monitor for services with DNS annotation to automatically create DNS records in an Azure Private Zone. The system user authorized to update the private zone will be an Azure Managed Identity, using AKS Workload Identity support.

Using Linux Capabilities in AKS

· 3 min read
Diego Casati
Principal Cloud Architect, Azure Global Black Belt

Introduction

Right after Kubernetes 1.21, the way Capabilities(7) worked in Kubernetes changed. At that version, a change in the upstream code enforced that Capabilities will only work when runAsUser is set to 0 - meaning root. This is somewhat counterintuitive to what most of us would expect but code goes into the reasoning and how to work with Capabilities after 1.21.

Image Verification Part 1 - Notation CLI

· 7 min read
Steve Griffith
Principal Cloud Architect, Azure Global Black Belt

Introduction

This is part one of a two part post on container image signing and runtime verification. In this post, we'll walk through the notation project and its ability to sign container images, using the Notary project specification. In the next post, we'll walk through setting up gatekeeper and ratify to perform policy based runtime verification of images.

AKS Custom Policy

· 5 min read
Steve Griffith
Principal Cloud Architect, Azure Global Black Belt

Introduction

In this walkthrough we'll use the Gatekeeper project and AKS Policy to create a policy that resticts the host name on a Kubernetes Ingress. The host names used for validation will be provided via parameters on the Azure Policy assignment.

AKS User Minimum Roles

· 7 min read
Steve Griffith
Principal Cloud Architect, Azure Global Black Belt

The following provides guidance on the minimum roles needed by an AKS user to get their credentials and interact with a namespace we'll create called 'sample-app'.

Using App Gateway for Containers with Egress Lockdown

· 8 min read
Steve Griffith
Principal Cloud Architect, Azure Global Black Belt

This walkthrough demonstates the setup of the new Azure App Gateway for Containers (hereafter AGC) managed ingress controller on a cluster configured with egress traffic forced to an Azure Firewall and with the cluster configured with outboundType Route Table.