Outbound network and FQDN rules for Azure Kubernetes Service (AKS) clusters

This article provides the necessary details that allow you to secure outbound traffic from your Azure Kubernetes Service (AKS). It contains the cluster requirements for a base AKS deployment and additional requirements for optional addons and features. You can apply this information to any outbound restriction method or appliance.

To see an example configuration using Azure Firewall, visit Control egress traffic using Azure Firewall in AKS.

Background

AKS clusters are deployed on a virtual network. This network can either be customized and pre-configured by you or it can be created and managed by AKS. In either case, the cluster has outbound, or egress, dependencies on services outside of the virtual network.

For management and operational purposes, nodes in an AKS cluster need to access certain ports and fully qualified domain names (FQDNs). These endpoints are required for the nodes to communicate with the API server or to download and install core Kubernetes cluster components and node security updates. For example, the cluster needs to pull container images from Microsoft Artifact Registry (MAR).

The AKS outbound dependencies are almost entirely defined with FQDNs, which don't have static addresses behind them. The lack of static addresses means you can't use network security groups (NSGs) to lock down the outbound traffic from an AKS cluster.

By default, AKS clusters have unrestricted outbound internet access. This level of network access allows nodes and services you run to access external resources as needed. If you wish to restrict egress traffic, a limited number of ports and addresses must be accessible to maintain healthy cluster maintenance tasks.

A network isolated AKS cluster, provides the simplest and most secure solution for setting up outbound restrictions for a cluster out of the box. A network isolated cluster pulls the images for cluster components and add-ons from a private Azure Container Registry (ACR) instance connected to the cluster instead of pulling from MAR. If the images aren't present, the private ACR pulls them from MAR and serves them via its private endpoint, eliminating the need to enable egress from the cluster to the public MAR endpoint. The cluster operator can then incrementally set up allowed outbound traffic securely over a private network for each scenario they want to enable. This way the cluster operators have complete control over designing the allowed outbound traffic from their clusters right from the start, thus allowing them to reduce the risk of data exfiltration.

Another solution to securing outbound addresses is using a firewall device that can control outbound traffic based on domain names. Azure Firewall can restrict outbound HTTP and HTTPS traffic based on the FQDN of the destination. You can also configure your preferred firewall and security rules to allow these required ports and addresses.

Important

This document covers only how to lock down the traffic leaving the AKS subnet. AKS has no ingress requirements by default. Blocking internal subnet traffic using network security groups (NSGs) and firewalls isn't supported. To control and block the traffic within the cluster, see Secure traffic between pods using network policies in AKS.

Required outbound network rules and FQDNs for AKS clusters

The following network and FQDN/application rules are required for an AKS cluster. You can use them if you wish to configure a solution other than Azure Firewall.

  • IP address dependencies are for non-HTTP/S traffic (both TCP and UDP traffic).
  • FQDN HTTP/HTTPS endpoints can be placed in your firewall device.
  • Wildcard HTTP/HTTPS endpoints are dependencies that can vary with your AKS cluster based on a number of qualifiers.
  • AKS uses an admission controller to inject the FQDN as an environment variable to all deployments under kube-system and gatekeeper-system. This ensures all system communication between nodes and API server uses the API server FQDN and not the API server IP. You can get the same behavior on your own pods, in any namespace, by annotating the pod spec with an annotation named kubernetes.azure.com/set-kube-service-host-fqdn. If that annotation is present, AKS will set the KUBERNETES_SERVICE_HOST variable to the domain name of the API server instead of the in-cluster service IP. This is useful in cases where the cluster egress is via a layer 7 firewall.
  • If you have an app or solution that needs to talk to the API server, you must either add an additional network rule to allow TCP communication to port 443 of your API server's IP OR , if you have a layer 7 firewall configured to allow traffic to the API Server's domain name, set kubernetes.azure.com/set-kube-service-host-fqdn in your pod specs.
  • On rare occasions, if there's a maintenance operation, your API server IP might change. Planned maintenance operations that can change the API server IP are always communicated in advance.
  • You might notice traffic towards "md-*.blob.storage.azure.net" endpoint. This endpoint is used for internal components of Azure Managed Disks. Blocking access to this endpoint from your firewall should not cause any issues.
  • You might notice traffic towards "umsa*.blob.core.windows.net" endpoint. This endpoint is used to store manifests for Azure Linux VM Agent & Extensions and is regularly checked to download new versions. You can find more details on VM Extensions.

Azure Global required network rules

Destination Endpoint Protocol Port Use
*:1194
Or
ServiceTag - AzureCloud.<Region>:1194
Or
Regional CIDRs - RegionCIDRs:1194
Or
APIServerPublicIP:1194 (only known after cluster creation)
UDP 1194 For tunneled secure communication between the nodes and the control plane. This isn't required for private clusters, or for clusters with the konnectivity-agent enabled.
*:9000
Or
ServiceTag - AzureCloud.<Region>:9000
Or
Regional CIDRs - RegionCIDRs:9000
Or
APIServerPublicIP:9000 (only known after cluster creation)
TCP 9000 For tunneled secure communication between the nodes and the control plane. This isn't required for private clusters, or for clusters with the konnectivity-agent enabled.
*:123 or ntp.ubuntu.com:123 (if using Azure Firewall network rules) UDP 123 Required for Network Time Protocol (NTP) time synchronization on Linux nodes. This isn't required for nodes provisioned after March 2021.
CustomDNSIP:53 (if using custom DNS servers) UDP 53 If you're using custom DNS servers, you must ensure they're accessible by the cluster nodes.
APIServerPublicIP:443 (if running pods/deployments that access the API Server) TCP 443 Required if running pods/deployments that access the API Server, those pods/deployments would use the API IP. This port isn't required for private clusters.

Azure Global required FQDN / application rules

Destination FQDN Port Use
*.hcp.<location>.azmk8s.io HTTPS:443 Required for Node <-> API server communication. Replace <location> with the region where your AKS cluster is deployed. This is required for clusters with konnectivity-agent enabled. Konnectivity also uses Application-Layer Protocol Negotiation (ALPN) to communicate between agent and server. Blocking or rewriting the ALPN extension will cause a failure. This isn't required for private clusters.
mcr.microsoft.com HTTPS:443 Required to access images in Microsoft Container Registry (MCR). This registry contains first-party images/charts (for example, coreDNS, etc.). These images are required for the correct creation and functioning of the cluster, including scale and upgrade operations.
*.data.mcr.microsoft.com, mcr-0001.mcr-msedge.net HTTPS:443 Required for MCR storage backed by the Azure content delivery network (CDN).
management.azure.com HTTPS:443 Required for Kubernetes operations against the Azure API.
login.microsoftonline.com HTTPS:443 Required for Microsoft Entra authentication.
packages.microsoft.com HTTPS:443 This address is the Microsoft packages repository used for cached apt-get operations. Example packages include Moby, PowerShell, and Azure CLI.
acs-mirror.azureedge.net HTTPS:443 This address is for the repository required to download and install required binaries like kubenet and Azure CNI.

Microsoft Azure operated by 21Vianet required network rules

Destination Endpoint Protocol Port Use
*:1194
Or
ServiceTag - AzureCloud.Region:1194
Or
Regional CIDRs - RegionCIDRs:1194
Or
APIServerPublicIP:1194 (only known after cluster creation)
UDP 1194 For tunneled secure communication between the nodes and the control plane.
*:9000
Or
ServiceTag - AzureCloud.<Region>:9000
Or
Regional CIDRs - RegionCIDRs:9000
Or
APIServerPublicIP:9000 (only known after cluster creation)
TCP 9000 For tunneled secure communication between the nodes and the control plane.
*:22
Or
ServiceTag - AzureCloud.<Region>:22
Or
Regional CIDRs - RegionCIDRs:22
Or
APIServerPublicIP:22 (only known after cluster creation)
TCP 22 For tunneled secure communication between the nodes and the control plane.
*:123 or ntp.ubuntu.com:123 (if using Azure Firewall network rules) UDP 123 Required for Network Time Protocol (NTP) time synchronization on Linux nodes.
CustomDNSIP:53 (if using custom DNS servers) UDP 53 If you're using custom DNS servers, you must ensure they're accessible by the cluster nodes.
APIServerPublicIP:443 (if running pods/deployments that access the API Server) TCP 443 Required if running pods/deployments that access the API Server, those pod/deployments would use the API IP.

Microsoft Azure operated by 21Vianet required FQDN / application rules

Destination FQDN Port Use
*.hcp.<location>.cx.prod.service.azk8s.cn HTTPS:443 Required for Node <-> API server communication. Replace <location> with the region where your AKS cluster is deployed.
*.tun.<location>.cx.prod.service.azk8s.cn HTTPS:443 Required for Node <-> API server communication. Replace <location> with the region where your AKS cluster is deployed.
mcr.microsoft.com HTTPS:443 Required to access images in Microsoft Container Registry (MCR). This registry contains first-party images/charts (for example, coreDNS, etc.). These images are required for the correct creation and functioning of the cluster, including scale and upgrade operations.
.data.mcr.microsoft.com HTTPS:443 Required for MCR storage backed by the Azure Content Delivery Network (CDN).
management.chinacloudapi.cn HTTPS:443 Required for Kubernetes operations against the Azure API.
login.chinacloudapi.cn HTTPS:443 Required for Microsoft Entra authentication.
packages.microsoft.com HTTPS:443 This address is the Microsoft packages repository used for cached apt-get operations. Example packages include Moby, PowerShell, and Azure CLI.
*.azk8s.cn HTTPS:443 This address is for the repository required to download and install required binaries like kubenet and Azure CNI.

Azure US Government required network rules

Destination Endpoint Protocol Port Use
*:1194
Or
ServiceTag - AzureCloud.<Region>:1194
Or
Regional CIDRs - RegionCIDRs:1194
Or
APIServerPublicIP:1194 (only known after cluster creation)
UDP 1194 For tunneled secure communication between the nodes and the control plane.
*:9000
Or
ServiceTag - AzureCloud.<Region>:9000
Or
Regional CIDRs - RegionCIDRs:9000
Or
APIServerPublicIP:9000 (only known after cluster creation)
TCP 9000 For tunneled secure communication between the nodes and the control plane.
*:123 or ntp.ubuntu.com:123 (if using Azure Firewall network rules) UDP 123 Required for Network Time Protocol (NTP) time synchronization on Linux nodes.
CustomDNSIP:53 (if using custom DNS servers) UDP 53 If you're using custom DNS servers, you must ensure they're accessible by the cluster nodes.
APIServerPublicIP:443 (if running pods/deployments that access the API Server) TCP 443 Required if running pods/deployments that access the API Server, those pods/deployments would use the API IP.

Azure US Government required FQDN / application rules

Destination FQDN Port Use
*.hcp.<location>.cx.aks.containerservice.azure.us HTTPS:443 Required for Node <-> API server communication. Replace <location> with the region where your AKS cluster is deployed.
mcr.microsoft.com HTTPS:443 Required to access images in Microsoft Container Registry (MCR). This registry contains first-party images/charts (for example, coreDNS, etc.). These images are required for the correct creation and functioning of the cluster, including scale and upgrade operations.
*.data.mcr.microsoft.com HTTPS:443 Required for MCR storage backed by the Azure content delivery network (CDN).
management.usgovcloudapi.net HTTPS:443 Required for Kubernetes operations against the Azure API.
login.microsoftonline.us HTTPS:443 Required for Microsoft Entra authentication.
packages.microsoft.com HTTPS:443 This address is the Microsoft packages repository used for cached apt-get operations. Example packages include Moby, PowerShell, and Azure CLI.
acs-mirror.azureedge.net HTTPS:443 This address is for the repository required to install required binaries like kubenet and Azure CNI.

The following FQDN / application rules aren't required, but are recommended for AKS clusters:

Destination FQDN Port Use
security.ubuntu.com, azure.archive.ubuntu.com, changelogs.ubuntu.com HTTP:80 This address lets the Linux cluster nodes download the required security patches and updates.
snapshot.ubuntu.com HTTPS:443 This address lets the Linux cluster nodes download the required security patches and updates from ubuntu snapshot service.

If you choose to block/not allow these FQDNs, the nodes will only receive OS updates when you do a node image upgrade or cluster upgrade. Keep in mind that node image upgrades also come with updated packages including security fixes.

GPU enabled AKS clusters required FQDN / application rules

Destination FQDN Port Use
nvidia.github.io HTTPS:443 This address is used for correct driver installation and operation on GPU-based nodes.
us.download.nvidia.com HTTPS:443 This address is used for correct driver installation and operation on GPU-based nodes.
download.docker.com HTTPS:443 This address is used for correct driver installation and operation on GPU-based nodes.

Windows Server based node pools required FQDN / application rules

Destination FQDN Port Use
onegetcdn.azureedge.net, go.microsoft.com HTTPS:443 To install windows-related binaries
*.mp.microsoft.com, www.msftconnecttest.com, ctldl.windowsupdate.com HTTP:80 To install windows-related binaries

If you choose to block/not allow these FQDNs, the nodes will only receive OS updates when you do a node image upgrade or cluster upgrade. Keep in mind that Node Image Upgrades also come with updated packages including security fixes.

AKS features, addons, and integrations

Workload identity

Required FQDN / application rules

Destination FQDN Port Use
login.microsoftonline.com or login.chinacloudapi.cn or login.microsoftonline.us HTTPS:443 Required for Microsoft Entra authentication.

Microsoft Defender for Containers

Required FQDN / application rules

FQDN Port Use
login.microsoftonline.com
login.microsoftonline.us (Azure Government)
login.microsoftonline.cn (Azure operated by 21Vianet)
HTTPS:443 Required for Microsoft Entra Authentication.
*.ods.opinsights.azure.com
*.ods.opinsights.azure.us (Azure Government)
*.ods.opinsights.azure.cn (Azure operated by 21Vianet)
HTTPS:443 Required for Microsoft Defender to upload security events to the cloud.
*.oms.opinsights.azure.com
*.oms.opinsights.azure.us (Azure Government)
*.oms.opinsights.azure.cn (Azure operated by 21Vianet)
HTTPS:443 Required to authenticate with Log Analytics workspaces.

Azure Key Vault provider for Secrets Store CSI Driver

If using network isolated clusters, it's recommended to set up private endpoint to access Azure Key Vault.

If your cluster has outbound type user-defined routing and Azure Firewall, the following network rules and application rules are applicable:

Required FQDN / application rules

FQDN Port Use
vault.azure.net HTTPS:443 Required for CSI Secret Store addon pods to talk to Azure KeyVault server.
*.vault.usgovcloudapi.net HTTPS:443 Required for CSI Secret Store addon pods to talk to Azure KeyVault server in Azure Government.

Azure Monitor - Managed Prometheus and Container Insights

If using network isolated clusters, it's recommended to set up private endpoint based ingestion, which is supported for both Managed Prometheus (Azure Monitor workspace) and Container insights (Log Analytics workspace).

If your cluster has outbound type user-defined routing and Azure Firewall, the following network rules and application rules are applicable:

Required network rules

Destination Endpoint Protocol Port Use
ServiceTag - AzureMonitor:443 TCP 443 This endpoint is used to send metrics data and logs to Azure Monitor and Log Analytics.

Azure public cloud required FQDN / application rules

Endpoint Purpose Port
*.ods.opinsights.azure.com 443
*.oms.opinsights.azure.com 443
dc.services.visualstudio.com 443
*.monitoring.azure.com 443
login.microsoftonline.com 443
global.handler.control.monitor.azure.com Access control service 443
*.ingest.monitor.azure.com Container Insights - logs ingestion endpoint (DCE) 443
*.metrics.ingest.monitor.azure.com Azure monitor managed service for Prometheus - metrics ingestion endpoint (DCE) 443
<cluster-region-name>.handler.control.monitor.azure.com Fetch data collection rules for specific cluster 443

Microsoft Azure operated by 21Vianet cloud required FQDN / application rules

Endpoint Purpose Port
*.ods.opinsights.azure.cn Data ingestion 443
*.oms.opinsights.azure.cn Azure Monitor agent (AMA) onboarding 443
dc.services.visualstudio.com For agent telemetry that uses Azure Public Cloud Application Insights 443
global.handler.control.monitor.azure.cn Access control service 443
<cluster-region-name>.handler.control.monitor.azure.cn Fetch data collection rules for specific cluster 443
*.ingest.monitor.azure.cn Container Insights - logs ingestion endpoint (DCE) 443
*.metrics.ingest.monitor.azure.cn Azure monitor managed service for Prometheus - metrics ingestion endpoint (DCE) 443

Azure Government cloud required FQDN / application rules

Endpoint Purpose Port
*.ods.opinsights.azure.us Data ingestion 443
*.oms.opinsights.azure.us Azure Monitor agent (AMA) onboarding 443
dc.services.visualstudio.com For agent telemetry that uses Azure Public Cloud Application Insights 443
global.handler.control.monitor.azure.us Access control service 443
<cluster-region-name>.handler.control.monitor.azure.us Fetch data collection rules for specific cluster 443
*.ingest.monitor.azure.us Container Insights - logs ingestion endpoint (DCE) 443
*.metrics.ingest.monitor.azure.us Azure monitor managed service for Prometheus - metrics ingestion endpoint (DCE) 443

Azure Policy

Required FQDN / application rules

FQDN Port Use
data.policy.core.windows.net HTTPS:443 This address is used to pull the Kubernetes policies and to report cluster compliance status to policy service.
store.policy.core.windows.net HTTPS:443 This address is used to pull the Gatekeeper artifacts of built-in policies.
dc.services.visualstudio.com HTTPS:443 Azure Policy add-on that sends telemetry data to applications insights endpoint.

Microsoft Azure operated by 21Vianet required FQDN / application rules

FQDN Port Use
data.policy.azure.cn HTTPS:443 This address is used to pull the Kubernetes policies and to report cluster compliance status to policy service.
store.policy.azure.cn HTTPS:443 This address is used to pull the Gatekeeper artifacts of built-in policies.

Azure US Government required FQDN / application rules

FQDN Port Use
data.policy.azure.us HTTPS:443 This address is used to pull the Kubernetes policies and to report cluster compliance status to policy service.
store.policy.azure.us HTTPS:443 This address is used to pull the Gatekeeper artifacts of built-in policies.

AKS cost analysis add-on

Required FQDN / application rules

FQDN Port Use
management.azure.com
management.usgovcloudapi.net (Azure Government)
management.chinacloudapi.cn (Azure operated by 21Vianet)
HTTPS:443 Required for Kubernetes operations against the Azure API.
login.microsoftonline.com
login.microsoftonline.us (Azure Government)
login.microsoftonline.cn (Azure operated by 21Vianet)
HTTPS:443 Required for Microsoft Entra ID authentication.

Cluster extensions

Required FQDN / application rules

FQDN Port                Use
<region>.dp.kubernetesconfiguration.azure.com HTTPS:443 This address is used to fetch configuration information from the Cluster Extensions service and report extension status to the service.
mcr.microsoft.com, *.data.mcr.microsoft.com HTTPS:443 This address is required to pull container images for installing cluster extension agents on AKS cluster.
arcmktplaceprod.azurecr.io HTTPS:443 This address is required to pull container images for installing marketplace extensions on AKS cluster.
arcmktplaceprod.centralindia.data.azurecr.io HTTPS:443 This address is for the Central India regional data endpoint and is required to pull container images for installing marketplace extensions on AKS cluster.
arcmktplaceprod.japaneast.data.azurecr.io HTTPS:443 This address is for the East Japan regional data endpoint and is required to pull container images for installing marketplace extensions on AKS cluster.
arcmktplaceprod.westus2.data.azurecr.io HTTPS:443 This address is for the West US2 regional data endpoint and is required to pull container images for installing marketplace extensions on AKS cluster.
arcmktplaceprod.westeurope.data.azurecr.io HTTPS:443 This address is for the West Europe regional data endpoint and is required to pull container images for installing marketplace extensions on AKS cluster.
arcmktplaceprod.eastus.data.azurecr.io HTTPS:443 This address is for the East US regional data endpoint and is required to pull container images for installing marketplace extensions on AKS cluster.
*.ingestion.msftcloudes.com, *.microsoftmetrics.com HTTPS:443 This address is used to send agents metrics data to Azure.
marketplaceapi.microsoft.com HTTPS: 443 This address is used to send custom meter-based usage to the commerce metering API.

Azure US Government required FQDN / application rules

FQDN Port Use
<region>.dp.kubernetesconfiguration.azure.us HTTPS:443 This address is used to fetch configuration information from the Cluster Extensions service and report extension status to the service.
mcr.microsoft.com, *.data.mcr.microsoft.com HTTPS:443 This address is required to pull container images for installing cluster extension agents on AKS cluster.

Note

For any addons that aren't explicitly stated here, the core requirements cover it.

Istio-based service mesh add-on

In Istio=based service mesh add-on, if you are setting up istiod with a Plugin Certificate Authority (CA) or if you are setting up secure ingress gateway, Azure Key Vault provider for Secrets Store CSI Driver is required for these features. Outbound network requirements for Azure Key Vault provider for Secrets Store CSI Driver can be found here.

Application routing add-on

Application routing add-on supports SSL termination at the ingress with certificates stored in Azure Key Vault. Outbound network requirements for Azure Key Vault provider for Secrets Store CSI Driver can be found here.

Next steps

In this article, you learned what ports and addresses to allow if you want to restrict egress traffic for the cluster.

If you want to restrict how pods communicate between themselves and East-West traffic restrictions within cluster see Secure traffic between pods using network policies in AKS.