AKS Production Baseline - amitbhilagude/userfullinks GitHub Wiki
AKS Private Cluster
Private clusters will not allow access to Kubernetes APIs. Which will provide high-level security.
This will require additional implementation on deploying the application. e.g. We may need to set up DevOps Agent in VM which is part of the same event.
Alternate option is to create a public cluster but put Firewall restrictions e.g. DevOps IP Address
Hub and Spoke Network Topology
In this topology Hub vnet will have Azure Firewall, Azure Baston and VPN Gateway for on-Prem Connectivity.
All other vents will have peered with Hub. which is called Spoke.
One Spoke will have AKS cluster setup, it includes
One subnet with App gateway which is accessible publicly.
one subnet with an Internal load balancer where app gateway will route the traffic.
One subnet will have an AKS cluster.
End-to-end traffic flow
Inbound traffic will route the App gateway with WAF->ILB->Cluster
Outbound traffic will route to the Azure Firewall.
Plan IP address
CNI networking over default kubenet networking will get IP addresses to the POD from subnets.
This will also give flexibility to assigned IP addresses of subnet to the private endpoint with keyvault and car.
when patches or maitanace activity taken, internally it creates temp cluster which will try to use IP addresses from cluster so make sure you have enough IP addresses reservered in vnet.