AKS Egress Traffic and Outbound Types

Поділитися
Вставка
  • Опубліковано 5 січ 2025
  • AKS have multiple options to manage the egress or outbound traffic. These options are Load Balancer, NAT Gateway and User Defined Routing (UDR). In this lightboard session, I explain all these modes available in #Azure #Kubernetes #AKS.
    The outbound type Load Balancer is the default mode and should fit for most cases.
    However, if we might have the issue of SNAT port exhaustion, then we should use the NAT Gateway mode.
    And for enterprises using Landing Zone, Hub & Spoke architecture and wants to control and filter the AKS egress traffic, they should use the User Defined Routing (UDR) mode.
    With this latter mode, we should pay attention to the asymmetric routing for ingress traffic.
    Source code and resources are available here: github.com/Hou...
    Follow me on Twitter for more content: / houssemdellai

КОМЕНТАРІ •

  • @preranaarukala
    @preranaarukala 11 місяців тому

    effective explanation to understand easily

  • @balusolo7896
    @balusolo7896 Рік тому

    That was really helpful, Thank you Houssem

  • @nikhilrajan2370
    @nikhilrajan2370 Рік тому

    This is nice... was lookin at these a few days back...

  • @cloudwork-y4c
    @cloudwork-y4c 7 місяців тому

    Hello Houssem. Great explanation. It would be great to hear how to have outbound/NAT not on public but on private IP. Generaly I've been searching but there is no doc or article at all.

  • @yousefshaban4724
    @yousefshaban4724 Рік тому

    Thanks hussam , please explain more about how to design and choose ingress and load balancer for multiple cluster and multi-tenancy

  • @waychow8488
    @waychow8488 Рік тому

    This is nice sharing... but I don't quite understand when ingress using Application gateway egress should use Azure Firewall or not ?

  • @sundeepbhatia213
    @sundeepbhatia213 Рік тому

    Super explain

  • @georgedicu7397
    @georgedicu7397 Рік тому

    I'm not sure I understand.
    So you mentioned we can use the same public ip of the firewall for the LB? Then we still need DNAT? can you elaborate on this more?