Skip to content

Custom Networks

The provided custom deployment solution is a sample of how to leverage the virtual network (VNet) injection feature. This allows for the integration of the solution into a preexisting network design and ensuring the solution is on an internal network.

Planning

Network planning is crucial when working with AKS on a prexexisting network solution. This is an advanced topic and the assumption when bringing your own network is that it has been planned properly in advance.

Several resources exist that can help on planning networks for AKS and to understand the networking concepts for AKS.

Default Solution

The default solution implemented uses a simple Virtual Network with a kubernetes Azure CNI Overlay network configuration. One subnet which is provided to the AKS cluster is required, while additional subnets can be enabled for optional features.

  • Virtual Network CIDR: 10.1.0.0/16

  • Cluster Nodes Subnet CIDR: 10.1.0.0/20

  • Bastion Subnet CIDR: 10.1.16.0/24 (Optional: Feature)

  • Virtual Machine Subnet CIDR: 10.1.18.0/24 (Optional: Feature)

  • Cluster Pod Subnet CIDR: 10.1.20.0/22 (Optional: Feature)

  • AKS Service CIDR: 172.16.0.0/16

  • AKS DNS Service IP: 172.16.0.10

Custom Solution

This custom configuration tutorial will use a pre-created network along with a dedicated Pod Subnet which activates the Azure CNI for dynamic IP allocation network configuration instead.

Things to considered when planning.

  • Virtual network
  • A network can be as large as /8, but has a limit of 65,536 IP Address

  • Subnet

  • A minimum subnet size: (number of nodes + 1) + ((number of nodes + 1) * maximum pods per node that you configure)
  • Example 8 node cluster: (9) + (9 * 30 (default, 30 pods per node)) = 270 (/23 or larger)

  • Kubernetes Service Address

  • Must be smaller then /12

Network Details

For this example the following network details will be used.

[0]

  • Virtual Network CIDR: 172.20.0.0/22

  • Cluster Nodes Subnet CIDR: 172.20.0.0/24

  • Pod Subnet CIDR: 172.20.4.0/22

Prepare a virtual network

This section outlines the steps for manually creating a virtual network outside of the solution to simulate just the spoke network.

It is important to ensure that the network exists in the same location that the solution will be deployed in. For this example the location to be used will be the eastus2 region.

Resource Group

Use the following command to create a new resource group:

NETWORK_GROUP='operations'
AZURE_LOCATION='eastus2'

# resource_group
az group create --name $NETWORK_GROUP \
--location $AZURE_LOCATION
$NETWORK_GROUP = 'operations'
$AZURE_LOCATION = 'eastus2'

# resource_group
az group create --name $NETWORK_GROUP `
--location $AZURE_LOCATION

Network Security Group

Network Security Groups (NSGs) are essential for securing virtual network resources. NSGs control inbound and outbound traffic to network interfaces (NIC), VMs, and subnets.

Use the following commands set up an NSG with rules to allow HTTP and HTTPS traffic.

NSG_NAME='custom-vnet-nsg'

# network_security_group
az network nsg create --name $NSG_NAME \
--resource-group $NETWORK_GROUP \
--location $AZURE_LOCATION


# http_inbound_rule
az network nsg rule create --name AllowHttpInbound \
--nsg-name $NSG_NAME --resource-group $NETWORK_GROUP \
--priority 200 --access Allow --direction Inbound \
--protocol 'Tcp' --source-address-prefixes 'VirtualNetwork' --source-port-ranges '*' \
--destination-address-prefixes '*' --destination-port-ranges '80'

# https_inbound_rule
az network nsg rule create --name AllowHttpsInbound \
--nsg-name $NSG_NAME --resource-group $NETWORK_GROUP \
--priority 210 --access Allow --direction Inbound \
--protocol 'Tcp' --source-address-prefixes 'VirtualNetwork' --source-port-ranges '*' \
--destination-address-prefixes '*' --destination-port-ranges '443'
$NSG_NAME = 'custom-vnet-nsg'

# network_security_group
az network nsg create --name $NSG_NAME `
--resource-group $NETWORK_GROUP `
--location $AZURE_LOCATION


# http_inbound_rule
az network nsg rule create --name AllowHttpInbound `
--nsg-name $NSG_NAME --resource-group $NETWORK_GROUP `
--priority 200 --access Allow --direction Inbound `
--protocol 'Tcp' --source-address-prefixes 'VirtualNetwork' --source-port-ranges '*' `
--destination-address-prefixes '*' --destination-port-ranges '80'

# https_inbound_rule
az network nsg rule create --name AllowHttpsInbound `
--nsg-name $NSG_NAME --resource-group $NETWORK_GROUP `
--priority 210 --access Allow --direction Inbound `
--protocol 'Tcp' --source-address-prefixes 'VirtualNetwork' --source-port-ranges '*' `
--destination-address-prefixes '*' --destination-port-ranges '443'

Virtual Network

The virtual network is a critical component that enables Azure resources like AKS to communicate effectively. This step involves setting up the required 'ClusterSubnet' and an optional 'PodSubnet'.

Use the following commands set up the network with a required subnet for the cluster and an optional subnet for the pods.

NETWORK_NAME='custom-vnet'
VNET_PREFIX='172.20.0.0/22'

CLUSTER_SUBNET_NAME='cluster'
CLUSTER_SUBNET_PREFIX='172.20.0.0/24'

POD_SUBNET_NAME='pods'
POD_SUBNET_PREFIX='172.20.1.0/24'

# virtual_network
az network vnet create --name $NETWORK_NAME \
--resource-group $NETWORK_GROUP \
--location $AZURE_LOCATION \
--address-prefix $VNET_PREFIX

# virtual_network_subnet_cluster
az network vnet subnet create --name $CLUSTER_SUBNET_NAME \
--resource-group $NETWORK_GROUP \
--vnet-name $NETWORK_NAME \
--address-prefix $CLUSTER_SUBNET_PREFIX \
--network-security-group $NSG_NAME

# virtual_network_subnet_pods
az network vnet subnet create --name $POD_SUBNET_NAME \
--resource-group $NETWORK_GROUP \
--vnet-name $NETWORK_NAME \
--address-prefix $POD_SUBNET_PREFIX \
--network-security-group $NSG_NAME

# managed_identity
az identity create --name $NETWORK_NAME \
--resource-group $NETWORK_GROUP \
--location $AZURE_LOCATION

# managed_identity_principal_id
IDENTITY_PID=$(az identity show --name $NETWORK_NAME \
--resource-group $NETWORK_GROUP \
--query "principalId" --output tsv)

# managed_identity_id
NETWORK_IDENTITY=$(az identity show --name $NETWORK_NAME \
--resource-group $NETWORK_GROUP \
--query "id" --output tsv)

# network_id
NETWORK_ID=$(az network vnet show --name $NETWORK_NAME \
--resource-group $NETWORK_GROUP \
--query "id" -o tsv)

# role_assignment
az role assignment create --assignee $IDENTITY_PID \
--role "Network Contributor" \
--scope $NETWORK_ID
$NETWORK_NAME = 'custom-vnet'
$VNET_PREFIX = '172.20.0.0/22'

$CLUSTER_SUBNET_NAME = 'cluster'
$CLUSTER_SUBNET_PREFIX = '172.20.0.0/24'

$POD_SUBNET_NAME = 'pods'
$POD_SUBNET_PREFIX = '172.20.1.0/24'

# virtual_network
az network vnet create --name $NETWORK_NAME `
--resource-group $NETWORK_GROUP `
--location $AZURE_LOCATION `
--address-prefix $VNET_PREFIX

# virtual_network_subnet_cluster
az network vnet subnet create --name $CLUSTER_SUBNET_NAME `
--resource-group $NETWORK_GROUP `
--vnet-name $NETWORK_NAME `
--address-prefix $CLUSTER_SUBNET_PREFIX `
--network-security-group $NSG_NAME

# virtual_network_subnet_pods
az network vnet subnet create --name $POD_SUBNET_NAME `
--resource-group $NETWORK_GROUP `
--vnet-name $NETWORK_NAME `
--address-prefix $POD_SUBNET_PREFIX `
--network-security-group $NSG_NAME

# managed_identity
az identity create --name $NETWORK_NAME `
--resource-group $NETWORK_GROUP `
--location $AZURE_LOCATION

# managed_identity_principal_id
$IDENTITY_PID = az identity show --name $NETWORK_NAME `
--resource-group $NETWORK_GROUP `
--query "principalId" --output tsv

# managed_identity_id
$NETWORK_IDENTITY = az identity show --name $NETWORK_NAME `
--resource-group $NETWORK_GROUP `
--query "id" --output tsv

# network_id
$NETWORK_ID = az network vnet show --name $NETWORK_NAME `
--resource-group $NETWORK_GROUP `
--query "id" -o tsv

# role_assignment
az role assignment create --assignee $IDENTITY_ID `
--role "Network Contributor" `
--scope $NETWORK_ID

Initialize and Configure Solution

This section provides the steps to authenticate your session then initialize a custom environment using Azure Developer CLI (azd).

Authenticate and Initialize

First, authenticate your session and then initialize a custom environment:

# authenticate_session
azd auth login

# create_new_environment
azd env new custom
# authenticate_session
azd auth login

# create_new_environment
azd env new custom

Configure Environment Variables

Set the necessary environment variables for your deployment:

# define_application_id
APP_NAME=<your_ad_application_name>
azd env set AZURE_CLIENT_ID $(az ad app list --display-name $APP_NAME --query "[].appId" -otsv)

# identify_software_repository
azd env set SOFTWARE_REPOSITORY https://github.com/azure/osdu-developer
azd env set SOFTWARE_BRANCH main

# enable_feature_toggles
azd env set ENABLE_POD_SUBNET true

# define_network_configuration
azd env set VIRTUAL_NETWORK_GROUP $NETWORK_GROUP
azd env set VIRTUAL_NETWORK_NAME $NETWORK_NAME
azd env set VIRTUAL_NETWORK_PREFIX $VNET_PREFIX
azd env set AKS_SUBNET_NAME $CLUSTER_SUBNET_NAME
azd env set AKS_SUBNET_PREFIX $CLUSTER_SUBNET_PREFIX
azd env set POD_SUBNET_NAME $POD_SUBNET_NAME
azd env set POD_SUBNET_PREFIX $POD_SUBNET_PREFIX
azd env set VIRTUAL_NETWORK_IDENTITY $NETWORK_IDENTITY
# define_application_id
$APP_NAME = '<your_ad_application_name>'
azd env set AZURE_CLIENT_ID (az ad app list --display-name $APP_NAME --query "[].appId" -otsv)

# identify_software_repository
azd env set SOFTWARE_REPOSITORY 'https://github.com/azure/osdu-developer'
azd env set SOFTWARE_BRANCH 'main'

# enable_feature_toggles
azd env set ENABLE_POD_SUBNET 'true'

# define_network_configuration
azd env set VIRTUAL_NETWORK_GROUP $NETWORK_GROUP
azd env set VIRTUAL_NETWORK_NAME $NETWORK_NAME
azd env set VIRTUAL_NETWORK_PREFIX $VNET_PREFIX
azd env set AKS_SUBNET_NAME $CLUSTER_SUBNET_NAME
azd env set AKS_SUBNET_PREFIX $CLUSTER_SUBNET_PREFIX
azd env set POD_SUBNET_NAME $POD_SUBNET_NAME
azd env set POD_SUBNET_PREFIX $POD_SUBNET_PREFIX
azd env set VIRTUAL_NETWORK_IDENTITY $NETWORK_IDENTITY

Start the Deployment

Initiate the deployment using the following command:

# provision_solution
azd provision
# provision_solution
azd provision