Hello @Bergs
If I understand correctly, I see that you said your organization has implemented a secure environment for your AKS clusters. Regarding your question about egress options, you mentioned that your organization is planning to use NAT Gateway as egress. However, your security team has concerns that it will access the services publicly instead of the private endpoint.
In this case, you may want to consider using Azure Firewall to protect your AKS clusters and secure outbound and inbound traffic. Azure Firewall can be used to restrict egress traffic and provide secure access to external resources. You can use Azure Firewall to create a DNAT rule that translates the public IP address of the firewall to the private IP address of the service endpoint. This way, your AKS cluster can access the services through the private endpoint, and the traffic will be secured by Azure Firewall. To back up the configuration of your AKS cluster, you can use the az aks show
command to retrieve the current configuration of your cluster. You can also use the az aks get-credentials
command to download the Kubernetes configuration file for your cluster.
This file contains the configuration of your cluster, including the API server endpoint, authentication credentials, and cluster certificate. To revert the changes, you can use the az aks update
command to update the configuration of your AKS cluster. You can also use the Kubernetes configuration file to revert the changes made to your cluster.
I hope this helps! Let me know if you have any other questions.