Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Network Policies in AKS #435

Closed
sharnath opened this issue Jun 14, 2018 · 38 comments
Closed

Network Policies in AKS #435

sharnath opened this issue Jun 14, 2018 · 38 comments
Labels
AzChina Azure China cloud support AzGov Azure Government cloud support network-policies

Comments

@sharnath
Copy link

We have hardened network policy requirements for certain group of K8S pods. Can I install AKS on multiple VNETs and attach it to a namescape? OR Does AKS support advanced network policies?

Example - Stateful pods should not have an outbound connection, Some communication pods can make internet connections, some pods allow a peer to peer communication for replication across the region.

How do we support these requirements with AKS?

@sauryadas
Copy link
Contributor

How do you plan to apply network policies? An AKS cluster can be deployed in a single VNET/subnet only. Network policy support is planned with Calico. You can use kube-router today if you wish.

@sharnath
Copy link
Author

sharnath commented Jun 17, 2018 via email

@sauryadas
Copy link
Contributor

sauryadas commented Jun 17, 2018 via email

@mjhoffman65
Copy link

Any update to the timeframe for Calico support with AKS? It is our preferred network policy implementation

@sauryadas
Copy link
Contributor

targeting q3 cy 2018

@mbrancato
Copy link

@sauryadas Can you elaborate if this will support the Azure network plugin with advanced networking?

@sauryadas
Copy link
Contributor

sauryadas commented Jul 30, 2018 via email

@suonto
Copy link

suonto commented Aug 15, 2018

@sauryadas I'm using kubenet - calico, but it seems that NetworkPolicies have no effect. Are they supposed to work already?

@MCKLMT
Copy link

MCKLMT commented Sep 13, 2018

Could we have a clear status on this feature please?
Is it possible to restrict the traffic between different namespaces on AKS? This blog post explains how to setup that with kube -router but you are telling it is not working yet with calico, correct?
https://carlos.mendible.com/2018/07/19/at-last-network-policies-in-aks-with-kube-router/

Thanks

@suonto
Copy link

suonto commented Sep 13, 2018

@MCKLMT just to be precise, currently AKS does not support calico network policy with kubenet (even though the docs say so). If you do not add it, the cluster creation command (arms template) outputs calico as the policy. However, it does not seem to be true, since any network policies I've created do not have any effect. But I guess it's coming...

@MCKLMT
Copy link

MCKLMT commented Sep 13, 2018

@sauryadas Could you give us more details about the support of network policies on AKS please?

@sauryadas
Copy link
Contributor

@MCKLMT Need another 4-6 weeks for the network policy integration with Calico. Will post an update when it is ready

@MCKLMT
Copy link

MCKLMT commented Sep 17, 2018

And what about kube-router?

@sauryadas
Copy link
Contributor

I believe kube-router should work but we havent tested it extensively.

@MCKLMT
Copy link

MCKLMT commented Sep 18, 2018

Some guys reported that the network policies on kube-router are not working properly.
@sauryadas Could you confirm that kube-router works as expected?

@badalk
Copy link

badalk commented Sep 24, 2018

@MCKLMT Need another 4-6 weeks for the network policy integration with Calico. Will post an update when it is ready

@sauryadas - is this something that can be prioritized. This is one of the must haves we need to pass through from the infosec standpoint to secure pod to pod communication or namespace to namespace communication

@dberuben
Copy link

@sauryadas Any update ?

@sauryadas
Copy link
Contributor

End of Nov.. Apologies for the delay.

@gonarys
Copy link

gonarys commented Nov 21, 2018

@sauryadas We are at the end of the month. Any update ?

@flamingboo
Copy link

@sauryadas network policies still planned for end of nov? or any new dates?

@azurewraith
Copy link

@sauryadas -- we're now into December, any updates on the ETA for this?

@bramvdklinkenberg
Copy link

would be (more than) nice to see this in AKS before the end of the year.

@yves-vogl
Copy link

@sauryadas Can you give a feedback about the current state of implementation? We think to postpone implementing kube-router for isolation in favour of the officially supported feature.

@seanmck
Copy link
Collaborator

seanmck commented Dec 5, 2018

The feature is basically complete, but as we are entering a holiday release freeze, it may not roll out until early January.

@badalk
Copy link

badalk commented Dec 5, 2018

@seanmck thats not a good news :(. May we know whether this would be based on calico / kube-router?

Regards
Badal

@yves-vogl
Copy link

Hallo @seanmck,
thanks for your feedback. And also thanks for the great work you guys do.
I wish you happy holidays and will look eagerly forward to January.

@badalk Do you really think so? For me these are great news as it means that there's progress and open communication. @sauryadas has already given an answer to your question: it will be based on Calico and can be used with Advanced Networking.

@badalk
Copy link

badalk commented Dec 5, 2018

@yves-vogl I did not mean that its a bad news for the community. In my context it is, as we have a release planned before holidays and was expecting this to be available anytime soon.
@sauryadas and @seanmck my intent was not to put down the effort you guys put in in making aks and azure in general a better cloud platform. and I equally appreciate what you guys do

Have a great holiday all

@seanmck
Copy link
Collaborator

seanmck commented Dec 7, 2018

@badalk No worries. We certainly understand that it is frustrating when dates aren't hit. We will get this out as soon as we can.

@youenchene
Copy link

@seanmck any details on AKS update deployment strategy over the different regions?

@IgorRogDevPro
Copy link

@seanmck Sorry for possibly a stupid question, but are you looking forward to making calicoctl tool available for end users of AKS? I guess yes, since the users have access to K8S API in K8S, but would like to double check nevertheless.
Happy holidays!

@bcastilho90
Copy link

bcastilho90 commented Jan 3, 2019

Hi there @seanmck! Happy holidays!

Any updates on when it will be available? So looking forward to have this available in AKS.

Thanks

@badalk
Copy link

badalk commented Jan 18, 2019

Some guys reported that the network policies on kube-router are not working properly.
@sauryadas Could you confirm that kube-router works as expected?

I am facing the same issue, kube router deployed as daemonset does no seem to work very well with standard network policies. I am able to deny all traffic but If I allow traffic from other pods, it does not work

@erewok
Copy link

erewok commented Jan 31, 2019

@seanmck, I too would like to know the status of the Calico rollout for AKS. We're planning to work on some projects that require Network Policies, and I'm not sure if I should shuffle our schedule around to delay these.

I notice that the roadmap page lists this feature as "In Development" as of January 28th, but from your note above, I assumed it would be released around this time.

Does "In Development" mean we can enable it with a feature flag (so we can continue our own development that relies on this) or does it mean that it will be released shortly?

@mbrancato
Copy link

For anyone watching, it looks like Calico is available today in 1.12.4, which you should see as an available version now in AKS. It is a preview feature and unsupported. This is mentioned in the new change log document: https://github.com/Azure/AKS/blob/master/CHANGELOG.md

I previously asked if it would support Azure CNI implying existing clusters #435 (comment), it doesn't look like that support exists yet. New clusters only with the Calico CNI.

@sauryadas
Copy link
Contributor

And here is the official documentation
https://docs.microsoft.com/en-us/azure/aks/use-network-policies

@bobhenkel
Copy link

How long will this be in preview? Looking at when it will be in a release state and ready for production use.

Thanks!

@feiskyer
Copy link
Member

feiskyer commented May 7, 2019

Already supported and preview flag removed, see the documentation at https://docs.microsoft.com/en-us/azure/aks/use-network-policies.

@feiskyer feiskyer closed this as completed May 7, 2019
@thomas1206 thomas1206 added AzChina Azure China cloud support AzGov Azure Government cloud support feature and removed feature labels Oct 23, 2019
@ghost ghost locked as resolved and limited conversation to collaborators Aug 6, 2020
@aritraghosh aritraghosh moved this to Archive (GA older than 1 month) in Azure Kubernetes Service Roadmap (Public) Jul 10, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
AzChina Azure China cloud support AzGov Azure Government cloud support network-policies
Projects
Development

No branches or pull requests