Skip to content

[Az] Day 02: Private Azure Kubernetes (AKS) Environment Architecture.

Published: at 12:00 PM

Introduction

In today’s cloud-centric world, security is paramount. By default, many cloud services are publicly accessible over the internet, which can pose significant risks for sensitive workloads.

When deploying a private AKS (AKS) environment, it’s essential to protect all components while maintaining efficient network communication.

This post explains an architecture of private AKS that we are going to set up on Azure, leveraging multiple subnets, Azure Firewall, and other essential cloud services.

Private AKS Environment Architecture Diagram

(Download the original draw.io file here)


Table of Contents

Open Table of Contents

Architecture Overview

This architecture ensures that sensitive workloads remain isolated and protected from public internet exposure.

Hub VNet

The Hub VNet acts as the central point for network security and communication management, utilizing a hub-and-spoke architecture. It includes:

AKS VNet

The AKS VNet is designed to host the private AKS cluster, ensuring secure and efficient communication with other network components:

CloudPC VNet

The CloudPC VNet provides secure environments for virtual desktops and DevOps operations, maintaining isolation from critical infrastructure:


Subnet IP Allocation

Here is the summary of the private IP address allocation for each subnet:

VNet NameSubnet NameAddress PrefixTotalUsable
1. Hub VNet1.1 Firewall Subnet192.168.30.0/266459
1.2 Firewall Management Subnet192.168.30.64/265459
1.3 General Subnet192.168.30.128/273227
2. AKS VNet2.1 AKS Subnet192.168.31.0/24256251
3. CloudPC VNet3.1 CloudPC Subnet192.168.32.0/25128123
3.2 DevOps Subnet192.168.32.128/273227

Note: Adjust the address space according to your environment, as this is intended for demonstration purposes.


Conclusion

Designing the network architecture with a strong focus on security allows us to fully utilize Azure services while safeguarding our workloads from external threats. This private AKS environment offers a robust, scalable, and adaptable platform for deploying containerized applications.


References


Next

Day 03: Secret Management and Centralized Log Monitoring on Azure

In the next article, we will guide you through the process of establishing a secure and automated system for secret management using Azure Key Vault. Additionally, we will cover how to implement centralized log monitoring using Azure Log Analytics and Application Insights, enhancing observability and operational efficiency.


Thank You

Thank you for taking the time to read this guide! I hope it has been helpful, feel free to explore further, and happy coding! 🌟✨

Steven | GitHub