AKS icon indicating copy to clipboard operation
AKS copied to clipboard

Azure CNI Powered by Cilium L7/CRD Network Policy

Open chasewilson opened this issue 2 years ago • 25 comments

Public Preview ETA*: Q1 2025

*ETAs are estimations and subject to change.

This issue is to track support for Azure CNI Powered by Cilium Network Policy capability expansions.

Expansions Include:

  1. Layer 7 Network Policy support
  2. Cilium Custom Network Policies
    • Currently, one of the most requisition options is DNS filtering based policy support

This feature has a some good support already tracked in this GitHub Issue.

chasewilson avatar Jul 18 '23 14:07 chasewilson

@aanandr, @phealy would you be able to assist?

Issue Details

This issue is to track support for Azure CNI Powered by Cilium Network Policy capability expansions.

Expansions Include:

  1. Layer 7 Network Policy support
  2. Cilium Custom Network Policies
    • Currently, one of the most requisition options is DNS filtering based policy support

This feature has a some good support already tracked in this GitHub Issue.

Author: chasewilson
Assignees: -
Labels:

networking, networking/azcni, network-policies

Milestone: -

ghost avatar Jul 18 '23 14:07 ghost

Hi, @phealy any updates?

Hanifff avatar Aug 14 '23 12:08 Hanifff

Hey @Hanifff, thanks for commenting here. This Item is to track the request and interest for these features in Azure CNI Powered by Cilium. Right now there isn't a timeline but we are keeping an eye on what our customers want and would like it to build as needs arise.

Please feel free to provide feedback here about this and point others to add their reactions or feedback to make sure we're prioritizing our work correctly :)

chasewilson avatar Oct 03 '23 17:10 chasewilson

This would be really good to have.

westleydion avatar Oct 17 '23 15:10 westleydion

This would be really good to have.

Which portion of this are you most interested in? The Cilium Specific policies or the L7 capabilities?

chasewilson avatar Oct 17 '23 19:10 chasewilson

This would be really good to have.

Which portion of this are you most interested in? The Cilium Specific policies or the L7 capabilities?

My 2 cents here: both L3 DNS based rules and L7 policies, the former is actually a must-have. I guess both require Cilium Network Policies as the Kubernetes Network Policies don't support them.

EppO avatar Oct 18 '23 20:10 EppO

My team is also missing this feature, DNS based network policies is a must have for us.

ebc92 avatar Nov 01 '23 10:11 ebc92

Not stale. Lack of CiliumNetworkPolicy L3 FQDN rules is one of the reasons why we still need to BYOCNI, just to even use the most basic features of Cilium.

illrill avatar Feb 03 '24 08:02 illrill

The issue is still relevant

EppO avatar Jun 28 '24 04:06 EppO

Apparently, Azure will start supporting this in 1-2 months. Source: Talked to Isovalent employees at the KCD in Munich, Germany. Unfortunatley, Hubble UI integration etc. will take longer.

lieberlois avatar Jul 02 '24 11:07 lieberlois

@lieberlois thanks for the input here. Would you mind clarifying in what scenario Isovalent was planning L7 support?

From our side, we currently have support for hubble relay with self-managed UI and we're not working on l7 quite yet but are working on supporting FQDN filtering hopefully by the end of this month.

chasewilson avatar Jul 02 '24 14:07 chasewilson

@chasewilson This was in the context of layer 7 network policies 😄

lieberlois avatar Jul 02 '24 15:07 lieberlois

@lieberlois sorry for the confusion 😆.

I was meaning, did they say specifically Azure CNI Powered by Cilum, The enterprise marketplace offering they have, or the OSS Cilium support?

chasewilson avatar Jul 02 '24 15:07 chasewilson

@chasewilson As far as I understood yes, Azure CNI Powered by Cilium

lieberlois avatar Jul 02 '24 15:07 lieberlois

@lieberlois thanks for the clarification.

As of right now, we're not on L7 yet as we've had more requests (though L7 is highly requested as well) for FQDN and will be aiming for L7 after we get that out. So, not in the next month or two but should have some updates on timelines within that period.

chasewilson avatar Jul 02 '24 15:07 chasewilson

What exactly are you referring to then? Layer 7 network policies leverage FQDNs so what is missing then?

lieberlois avatar Jul 02 '24 15:07 lieberlois

What exactly are you referring to then? Layer 7 network policies leverage FQDNs so what is missing then?

Good question.

Cilium L7 policies and FQDN policies both work at Layer 7, but they have different focuses. L7 policies give you detailed control over app-specific traffic, letting you set rules based on things like HTTP methods or gRPC services.

On the other hand, FQDN policies are about controlling outbound traffic based on domain names. This is helpful in dynamic environments where IP addresses of external services change, but domain names stay the same.

chasewilson avatar Jul 02 '24 16:07 chasewilson

Okay you seem to have different naming than the typical Service Mesh terminology then 😄 I meant egress policies based on L7 Hostnames (FQDNs)

lieberlois avatar Jul 02 '24 16:07 lieberlois

@lieberlois aaahhh gotcha ok and I'm referring to L7 as application operations traffic. PUTs, GETs, etc.

chasewilson avatar Jul 02 '24 17:07 chasewilson

Still relevant

siegenthalerroger avatar Jul 23 '24 21:07 siegenthalerroger

still relevant also, we await eagerly for a public preview with the FQDN policies.

laurenbo avatar Jul 30 '24 09:07 laurenbo

still relevant also, we await eagerly for a public preview with the FQDN policies

maur1 avatar Aug 27 '24 07:08 maur1

still relevant

EvertonSA avatar Sep 06 '24 08:09 EvertonSA

Just a side note as some comments have asked for FQDN policies. This should be available as of last week, see https://github.com/Azure/AKS/issues/4205#issuecomment-2313389191 L7 policies (as in HTTP verb/path based filtering) aren't implemented yet.

TheKangaroo avatar Sep 06 '24 09:09 TheKangaroo

Will L7 support will be added to the Advanced Container Network Services (ACNS) offering?

(Also keenly awaiting this feature! It's truly a game changer.)

sebnyberg avatar Mar 25 '25 07:03 sebnyberg

is this feature available only for ACNS enabled users?

geowalrus4gh avatar May 13 '25 12:05 geowalrus4gh

@geowalrus4gh - Yes, that's correct.

quantumn-a5 avatar May 13 '25 15:05 quantumn-a5

Hi folks - just letting you know we aim to promote this to GA in mid-November, 2025.

danbosscher avatar Sep 10 '25 14:09 danbosscher

@danbosscher and @chasewilson,

Hi team,

Quick question—I have a customer who deployed Datadog to their AKS clusters using a Helm chart. Everything was working fine with Cilium Network Policy until yesterday (Nov 8, 2025). After restarting Datadog, the cluster is now rejecting the Datadog Cilium Network Policy with the following error: Failed sync attempt to: one or more objects failed to apply, reason: ciliumnetworkpolicies.cilium.io 'datadog' is forbidden: ValidatingAdmissionPolicy 'advanced-networking-validating-policy' with binding 'advanced-networking-cilium-l7-binding' denied request: CiliumNetworkPolicy cannot use DNS L7 rules.

Is this related to a known issue (same as this this one) or any recent change in policy enforcement? The customer mentioned it was working previously without any issues. Is there a fix expected around mid-November 2025?

wayden88 avatar Nov 10 '25 15:11 wayden88