Azure-docs: NTP and Port 9000

Created on 26 Jul 2019  Â·  15Comments  Â·  Source: MicrosoftDocs/azure-docs

Azure firewall Application rule collections do not support UDP and TCP ports, only http/https/mssql.

How do we restrict:
ntp.ubuntu.com UDP:123
*.hcp.<location>.azmk8s.io HTTPS:443, TCP:22, TCP:9000
*.tun.<location>.azmk8s.io HTTPS:443, TCP:22, TCP:9000


Document Details

⚠ Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.

Pri2 assigned-to-author container-servicsvc doc-enhancement triaged

Most helpful comment

Both this AKS feature plus Azure firewall in now GA, but Azure firewall cannot be used to fully implement it since it only support http/https for FQDN application rules. The article should reflect this.

All 15 comments

@patpicos Thanks for the question! We are investigating and will update you shortly.

@patpicos looking at the doc, the addresses you are interested in restricting appear under the required ports and addresses for AKS clusters in order to function properly.

https://docs.microsoft.com/en-us/azure/aks/limit-egress-traffic#required-ports-and-addresses-for-aks-clusters

This feature to restrict traffic is still in preview so as it moves to GA additional functionality will be added.

@MicahMcKittrick-MSFT Yes, they are required. My point/contention is that Azure firewall does not support

  • TCP ports with FQDN (Control plane on 9000/22)
  • UDP ports with FQDN (NTP)

A fall back would be to use IP address and Ports, but the IP's are ephemeral and therefore would be unmanageable.

Same issue here - as Azure Firewall application rule only supports HTTP/HTTPS/MSSQL, it is not possible to add TCP 22/9000 for *.hcp.<location>.azmk8s.io and *.tun.<location>.azmk8s.io

For ntp.ubuntu.com, probably we can leverage nslookup to grab the IP addresses.

@patpicos @ssbkang thanks for the feedback on this. I am going to assign the issue to the content author to review and best determine how to handle this from a documentation standpoint.

What if we use network rules with Service Tags to open port 22 and port 9000 to the local region of the AKS cluster? This opens more than we'd like, but maybe it is the best we can do today. Hopfully we'll have FQDN tag for AKS in Azure FW before too long - or maybe FQDN filtering in network rules.

Is there any update on this?

Both this AKS feature plus Azure firewall in now GA, but Azure firewall cannot be used to fully implement it since it only support http/https for FQDN application rules. The article should reflect this.

Hi, I can see the 9000 port is mentioned in networking rule section, please also correct the ntp rule documentation. and make note on how to convert 'ntp.ubuntu.com' to IP addresses in order to configure the ntp IP addresses. Thanks.

Expected:
in networking rule section:
UDP port 123 for all IP addresses of ntp.ubuntu.com is required for NTP time synchronization on Linux nodes.

Current:
ntp.ubuntu.com:123 mentioned in application rules.

Any updates on this?

same issue here.
so what is the solution ? did anyone restricted egress traffic of his AKS using azure FW ?

an interim solution is to provision the AKS Cluster, then query it to find out the fqdn of the provisioned API Server and add the rule into the firewall.

the command:
az aks show -g rgName -n k8sName --query fqdn -otsv

you can add the FQDN for NTP in the network rules section of Azure FW.

See the full FW example here: https://docs.microsoft.com/en-us/azure/aks/limit-egress-traffic#restrict-egress-traffic-using-azure-firewall

Thank you for updating @palma21

please-close

Was this page helpful?
0 / 5 - 0 ratings

Related issues

Favna picture Favna  Â·  3Comments

JeffLoo-ong picture JeffLoo-ong  Â·  3Comments

AronT-TLV picture AronT-TLV  Â·  3Comments

mrdfuse picture mrdfuse  Â·  3Comments

bityob picture bityob  Â·  3Comments