Network connectivity for Azure Arc-enabled Kubernetes

Arc-enabled Kubernetes supports fully connected and semi-connected modes for onboarding and managing Kubernetes clusters with Azure Arc's control plane. Azure Arc-enabled Kubernetes agents communicate with Azure Arc endpoints to exchange different types of metadata information using pull and push methods from Kubernetes clusters.

This document explains network architecture, design considerations, and design recommendations that help you enable connectivity to the Azure control plane so you can manage and operate Arc-enabled Kubernetes clusters running in on-premises and other cloud environments.

Architecture

The following diagram displays an Azure Arc-enabled Kubernetes network architecture that supports fully connected and semi-connected network connectivity modes.

A diagram showing Azure Arc-enabled Kubernetes network architecture.

The following diagram displays a network architecture that allows cluster access from any network location using Azure Arc-enabled Kubernetes Cluster Connect capability feature.

A diagram showing Azure Arc-enabled Kubernetes Cluster Connect network architecture.

Design considerations

  • Review the network topology and connectivity design area of the Azure landing zones to assess the effect of Azure Arc-enabled Kubernetes on your connectivity model.
  • Review the network requirements for Azure Arc-enabled Kubernetes to understand how clusters communicate with Azure from on-premises network or other cloud providers.
  • Consider trade-offs between your organization's security and compliance requirements and the benefits Azure Arc-enabled Kubernetes offers your organization. Decide between fully connected mode and semi-connected mode for your implementation.
  • Decide whether to use public or private endpoints when connecting to Azure Log Analytics workspaces through ExpressRoute or VPN versus internet connectivity.
  • Decide whether to use public or private endpoints when connecting to Azure Key Vaults through ExpressRoute or VPN versus internet connectivity.
  • Choose your network connectivity options for Azure Arc-enabled Kubernetes cluster management, since Azure Arc-enabled Kubernetes clusters support cluster management from any network. For design considerations and recommendations when deciding on network independent cluster management, see Identity and Access Management.
  • Consider securely managing Azure Arc-enabled Kubernetes cluster through the Cluster Connect capability to access anywhere, which eliminates inbound network port opening and allows only outbound communication to Azure Arc services in Azure.
  • When using on-premises or multicloud firewalls or proxy servers for TLS inspection of your outbound traffic and network intrusion detection and prevention system (IDPS), decide whether or not to exempt Azure Arc-enabled Kubernetes endpoints, since some of the server certificates aren't trusted by these firewalls or proxy servers.

Design recommendations

Next steps

For more information about your hybrid and multicloud cloud journey, see the following articles: