Connect Azure Front Door Premium to an AKS App origin with Private Link

James Dumont le Douarec
Microsoft Azure
Published in
4 min readJun 8, 2022

Introduction

This article will guide you through how to configure Azure Front Door Premium tier to connect to your private AKS app origin using the Azure Private Link service.

Publish and AKS App on Front Door with Azure Private Link Service
AKS Private Link Service

Prerequisites

Create a Private Link service for your AKS app

Warning: we will use the AKS Private Link Service integration. which is currently in preview.

  1. Deploy the following yaml via Kubectl in order to publish on your AKS:

2. Go to the Private Link Center and select Private link services. Then select the Private link that has been created by AKS and keep it’s name, will need it in the next chapter.

Private Link

Enable Private Link to the AKS internal load balancer

In this section, you’ll map the Private Link service to a private endpoint created in Azure Front Door’s private network.

  1. Within your Azure Front Door Premium profile, under Settings, select Origin groups.
  2. Select the origin group you want to enable Private Link for the internal load balancer.
  3. Select + Add an origin to add an internal load balancer origin. Note that the hostname must be a valid domain name, IPv4 or IPv6. There are two ways to select an Azure resource. The first option is by “In my directory” to select your own resources. The second option is “By ID or alias” to connect to someone else’s resource with a resource ID or alias that is shared with you. Select the the name of your Private Link using the option “In my directory”, the one you kept in the previous chapter.
Front Door Origin

Then select Add and then Update to save the origin group settings.

Approve Azure Front Door Premium private endpoint connection from Private link service

  1. Go to the Private Link Center and select Private link services. Then select your Private link name.
  2. Select Private endpoint connections under Settings.
  3. Select the pending private endpoint request from Azure Front Door Premium then select Approve. Select Yes to confirm you want to create this connection.
  4. Once approved, it should look like the screenshot below. It will take a few minutes for the connection to fully establish.
Approve the connection

Create Azure Front Door endpoint

The final step consists in linking your Front Door Origin to a Front Door endpoint and route.

In the following screenshot we forward all traffic to HTTP because our pod is only listening privately on HTTP and we redirect all traffic to use HTTPS to make sure that public access is done through HTTPS only.

Front Door route

Et voilà … Your AKS app has been published via Azure Front Door!

Conclusion

This is a fantastic opportunity to leverage a new type of Ingress Controller for AKS. Azure Front Door will bring native features like CDN, WAF and managed certificate that ease security, design and management of our Cloud solution.

See You in the Cloud

Jamesdld

--

--