-
Notifications
You must be signed in to change notification settings - Fork 310
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[ACNS] FQDN Filtering Policies #4205
Comments
Hi @chasewilson, |
@EppO I dont think so. I think it is FQDN filtering based on the new observability tool https://retina.sh . But I would love to hear from @chasewilson if this assumption is correct. |
Retina focuses on observability, while FQDN filtering goes beyond this scope. One might expect FQDN filtering policies to be enforced at the CNI level, but this is not currently supported by the |
Right, I just saw "FQDN filtering" on the retina roadmap and think it has something to do with ACNS FQDN policies. |
Google opted to create its own Meanwhile, there is also an upcoming FQDN selector in the official Network Policy API: kubernetes-sigs/network-policy-api#200. It'll be interesting to see how AKS implements this. |
@TheKangaroo @illrill Keep an eye out for some announcements coming in the next couple months for FQDN filtering. :) |
update: This feature is getting released for public preview this week as part of ACNS offering ACNS. We will share official docs page once it's out. |
You can enable FQDN filtering policies on AKS now! (you need aks-preview extension for az):
When you add an egress policy, don't forget to allow traffic to CoreDNS in |
Thanks for this @chasewilson @tamilmani1989 & CO! Good work splitting out DNS proxy to its own component for HA 👍 We've enabled ACNS in our clusters and have
Just beware of #4525 (currently, a regular |
@illrill yes we are aware of that issue. we found the cause and will be rolling out fix soon. |
Is there any plans to make the FQDN filtering policy feature support other networking setup? I'm talking about Azure CNI Powered by Cilium without overlay |
@EppO thanks for the question here. Great news is this is available for all Cilium compatible CNIs including Azure CNI Overlay, Azure CNI Dynamic IP Allocation, and Azure CNI Static Block Allocation. |
@chasewilson: That's good news! I swear I saw this limitation in the AKS docs when it got released but it's indeed now gone. Can't wait for this to go GA! EDIT: scratch that, the limitation I was mentioning (Overlay mode required) was for Node autoprovisioning |
GA ETA November 2024*
*ETA's are estimations and subject to change.
Advanced Container Networking Services supports FQDN Filtering
The text was updated successfully, but these errors were encountered: