-
Notifications
You must be signed in to change notification settings - Fork 312
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Network restrictions limitations of Azure Storage Account with AKS #1899
Comments
Hi aristosvo, AKS bot here 👋 I might be just a bot, but I'm told my suggestions are normally quite good, as such:
|
@aristosvo Why you are not using VNET Service Endpoints? -> https://docs.microsoft.com/en-us/azure/virtual-network/virtual-network-service-endpoints-overview I assume the AKS cluster and the Azure Storage Account are in the same Azure region? |
@neumanndaniel Thanks for the suggestion and it is probably the right solution for this problem 👍 AKS and SA are in the same region, so it definitely should work 🎉 In general, besides needing a technical solution for this particular problem I'm also a curious person and it would probably help future decision making if people know why this isn't working. In my experience it was a bit harder to automate with Terraform without BYO VNet for instance and I'd like to have more options. I've also opened an issue against Velero's Azure plugin and will probably submit a doc PR with explanation why this is not working to prevent people from banging their head into the same wall I did. 🤯 |
@aristosvo As AKS and Azure Storage are in the same region you only can use the VNET Service Endpoints approach. The network restriction option where you whitelist the public IP isn't working, when both resources are in the same region. As the traffic is handled internally in the region itself and never leaves the network via the outbound public IP. |
Triage required from @Azure/aks-pm |
Thanks for reaching out. I'm closing this issue as it was marked with "Answer Provided" and it hasn't had activity for 2 days. |
What happened:
We installed Velero with the Azure plugin (https://github.com/vmware-tanzu/velero-plugin-for-microsoft-azure) with AAD Pod Identity. First PoC worked amazing, until we changed to an Azure Storage Account with IP restrictions with our AKS outbound static IP in the allow list.
What you expected to happen:
IP limits on the connection to Azure Storage from user space should be possible by allowing only outbound AKS IPs. Based on this information I get a feeling where it might go wrong, but I don't understand why.
How to reproduce it (as minimally and precisely as possible):
Anything else we need to know?:
Environment:
kubectl version
):1.18.8
8
The text was updated successfully, but these errors were encountered: