Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Documentation quality updates #3208

Merged
merged 1 commit into from
Dec 10, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
14 changes: 10 additions & 4 deletions docs/en/rules/Azure.AKS.HttpAppRouting.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
reviewed: 2021-12-10
reviewed: 2024-12-10
severity: Important
pillar: Security
category: SE:06 Network controls
Expand All @@ -24,14 +24,18 @@ When exposing application endpoints consider using an ingress controller that su
- Encryption in transit over TLS.
- Multiple replicas.

Azure provides a production ready ingress controller _Application Gateway Ingress Controller_ (AGIC).
Azure Kubernetes Service provides several ingress controller options including:

- **Application routing add-on** — an NGINX-based managed ingress controller add-on.
- **Application Gateway Ingress Controller (AGIC)** — an ingress controller which integrates with Application Gateway.
- **Application Gateway for Containers** — is the successor to AGIC that additional features and scale.

HTTP application routing add-on (preview) for Azure Kubernetes Service (AKS) will be retired on 03 March 2025.

## RECOMMENDATION

Consider disabling the HTTP application routing add-on in your AKS cluster.
Also consider using Application Gateway Ingress Controller (AGIC) instead to protect application endpoints.
Also consider migrating to an alternative ingress controller.

## EXAMPLES

Expand Down Expand Up @@ -186,5 +190,7 @@ resource cluster 'Microsoft.ContainerService/managedClusters@2021-07-01' = {

- [SE:06 Network controls](https://learn.microsoft.com/azure/well-architected/security/networking)
- [HTTP application routing](https://learn.microsoft.com/azure/aks/http-application-routing)
- [Migrate from HTTP application routing to the application routing add-on](https://learn.microsoft.com/azure/aks/app-routing-migration)
- [What is Application Gateway for Containers?](https://learn.microsoft.com/azure/application-gateway/for-containers/overview)
- [Enable Application Gateway Ingress Controller add-on for an existing AKS cluster](https://learn.microsoft.com/azure/application-gateway/tutorial-ingress-controller-add-on-existing)
- [Azure deployment reference](https://learn.microsoft.com/azure/templates/microsoft.containerservice/managedclusters#ManagedClusterAutoUpgradeProfile)
- [Azure deployment reference](https://learn.microsoft.com/azure/templates/microsoft.containerservice/managedclusters)
8 changes: 5 additions & 3 deletions src/PSRule.Rules.Azure/rules/Azure.AKS.Rule.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -166,6 +166,7 @@ metadata:
labels:
Azure.MCSB.v1/control: ['IM-1', 'PA-1']
Azure.Policy/id: /providers/Microsoft.Authorization/policyDefinitions/993c2fcd-2b29-49d2-9eb0-df2c3a730c32
Azure.WAF/progressive: C
spec:
type:
- Microsoft.ContainerService/managedClusters
Expand Down Expand Up @@ -205,7 +206,7 @@ metadata:
ruleSet: 2021_12
Azure.WAF/pillar: Security
labels:
Azure.MCSB.v1/control: 'IM-8'
Azure.MCSB.v1/control: IM-8
spec:
type:
- Microsoft.ContainerService/managedClusters
Expand All @@ -225,7 +226,7 @@ metadata:
ruleSet: 2021_12
Azure.WAF/pillar: Security
labels:
Azure.MCSB.v1/control: 'DP-7'
Azure.MCSB.v1/control: DP-7
spec:
type:
- Microsoft.ContainerService/managedClusters
Expand All @@ -248,6 +249,7 @@ metadata:
Azure.WAF/pillar: Security
labels:
Azure.MCSB.v1/control: ['NS-1', 'DP-4']
Azure.WAF/progressive: C
spec:
type:
- Microsoft.ContainerService/managedClusters
Expand All @@ -270,7 +272,7 @@ metadata:
ruleSet: 2021_12
Azure.WAF/pillar: Security
labels:
Azure.MCSB.v1/control: 'PV-7'
Azure.MCSB.v1/control: PV-7
spec:
type:
- Microsoft.ContainerService/managedClusters
Expand Down
2 changes: 1 addition & 1 deletion src/PSRule.Rules.Azure/rules/Azure.Redis.Rule.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -45,7 +45,7 @@ metadata:
ruleSet: 2020_06
Azure.WAF/pillar: Security
labels:
Azure.MCSB.v1/control: 'DP-3'
Azure.MCSB.v1/control: DP-3
Azure.WAF/progressive: C
spec:
type:
Expand Down
Loading