Need help? Check hints [here 📘] (hints/helm.md)!
Especially when running multiple applications in your cluster you want to controll how traffic is coming into your environment and how different worloads are allowed to communicate within the cluster. In this challenge you will learn how to lock down your application for enterprise use.
- Deploying ingress with ssl termination
- Using network policies to lock down internal traffic
- Using authentication proxy to enforce auth at the ingress
- Move secrets to azure key vault
- Learn about ingress controller (https://kubernetes.io/docs/concepts/services-networking/ingress/)
- Deploy an ingress controller via Helm (https://github.com/kubernetes/charts/tree/master/stable/nginx-ingress)
- Configure the routes for ingress to your application (https://docs.microsoft.com/en-us/azure/aks/ingress)
- Learn about how to control traffic flows between containers https://docs.microsoft.com/de-de/azure/aks/use-network-policies
- Learn about having Kubernetes manage your azure network security group.
- Can you whitelist so that only specific ip ranges are allowed to your ingress controller? https://kubernetes.io/docs/tasks/access-application-cluster/configure-cloud-provider-firewall/
- Learn about moving secrets from your cluster to an azure keyvault using the managed identity of the nodes
- Check out what you need to do: https://learn.microsoft.com/en-us/azure/aks/csi-secrets-store-driver
- Learn about using different identities for different applications in the same cluster
- Check out what you need to do: https://learn.microsoft.com/en-us/azure/aks/learn/tutorial-kubernetes-workload-identity