AKS Egress Traffic and Outbound Types

Sdílet
Vložit
  • čas přidán 23. 04. 2023
  • AKS have multiple options to manage the egress or outbound traffic. These options are Load Balancer, NAT Gateway and User Defined Routing (UDR). In this lightboard session, I explain all these modes available in #Azure #Kubernetes #AKS.
    The outbound type Load Balancer is the default mode and should fit for most cases.
    However, if we might have the issue of SNAT port exhaustion, then we should use the NAT Gateway mode.
    And for enterprises using Landing Zone, Hub & Spoke architecture and wants to control and filter the AKS egress traffic, they should use the User Defined Routing (UDR) mode.
    With this latter mode, we should pay attention to the asymmetric routing for ingress traffic.
    Source code and resources are available here: github.com/HoussemDellai/dock...
    Follow me on Twitter for more content: / houssemdellai
  • Věda a technologie

Komentáře • 8

  • @user-vj2tp3qv6e
    @user-vj2tp3qv6e Před měsícem

    Hello Houssem. Great explanation. It would be great to hear how to have outbound/NAT not on public but on private IP. Generaly I've been searching but there is no doc or article at all.

  • @balusolo7896
    @balusolo7896 Před 6 měsíci

    That was really helpful, Thank you Houssem

  • @preranaarukala
    @preranaarukala Před 5 měsíci

    effective explanation to understand easily

  • @nikhilrajan2370
    @nikhilrajan2370 Před 10 měsíci

    This is nice... was lookin at these a few days back...

  • @sundeepbhatia213
    @sundeepbhatia213 Před rokem

    Super explain

  • @yousefshaban4724
    @yousefshaban4724 Před rokem

    Thanks hussam , please explain more about how to design and choose ingress and load balancer for multiple cluster and multi-tenancy

  • @waychow8488
    @waychow8488 Před 7 měsíci

    This is nice sharing... but I don't quite understand when ingress using Application gateway egress should use Azure Firewall or not ?

  • @georgedicu7397
    @georgedicu7397 Před rokem

    I'm not sure I understand.
    So you mentioned we can use the same public ip of the firewall for the LB? Then we still need DNAT? can you elaborate on this more?