Overview
Aviatrix Distributed Cloud Firewall (DCF) for Kubernetes extends Zero Trust security to containerized workloads across AWS EKS, Azure AKS, Google GKE, and self-managed Kubernetes clusters. This integration provides identity-based security policies, secure egress control, and unified visibility for Kubernetes environments.Key Capabilities
- Identity-Based Security — Enforce firewall policies based on Kubernetes identities (namespace, pod, service) rather than ephemeral IP addresses. Policies automatically follow workloads as they scale, move, or restart.
- Multicloud Kubernetes Security — Unified security policies across AWS EKS, Azure AKS, Google GKE, and self-managed clusters. Define security once, enforce everywhere.
- Native Kubernetes Integration — Define firewall policies using Kubernetes Custom Resource Definitions (CRDs). Security policies are managed with the same
kubectland YAML workflows your teams already use. - Secure Egress Control — Prevent unauthorized outbound traffic from Kubernetes workloads. Control egress at namespace, pod, and cluster levels with domain-based filtering.
- Advanced NAT and IP Management — Resolve IP overlap and exhaustion issues across multiple Kubernetes clusters with advanced NAT capabilities.
DCF currently enforces rules on traffic from Kubernetes clusters to destinations outside the VPC/VNet only.
Supported Kubernetes Distributions
- AWS Elastic Kubernetes Service (EKS)
- Azure Kubernetes Service (AKS)
- Google Kubernetes Engine (GKE)
- Self-managed and private Kubernetes clusters in cloud
Getting Started
To use DCF for Kubernetes:- Meet the prerequisites for your cloud provider.
- Enable Kubernetes Resource Discovery.
- Onboard your Kubernetes clusters. For private clusters, see Onboarding Private Kubernetes Clusters.
- Enable DCF policies for Kubernetes (see below).
- Optionally, install CRDs for in-cluster policy management.
- Create SmartGroups and DCF rules.
Enabling DCF Policies for Kubernetes
- Terraform
- CoPilot UI
Managing Policies with Kubernetes CRDs
DCF policies can be defined directly inside Kubernetes clusters using Custom Resource Definitions (CRDs). This allows platform teams to manage firewall policies with the samekubectl and GitOps workflows used for application deployments.
Installing the CRDs
Register the Aviatrix CRDs to your Kubernetes cluster using the Helm chart:Writing a Firewall Policy
AFirewallPolicy CRD defines egress rules for pods matching a label selector. The following example permits pods with the label app: dev-pods in the dev namespace to reach www.google.com on any protocol:
Writing a WebGroup Policy
AWebgroupPolicy CRD defines domain-based egress filtering as a standalone resource. The following example permits pods with the label app: web-client in the default namespace to reach specific domains:
Verifying Policy Status
Check policy events to confirm the policy was applied successfully:Warning type or a Reason ending in Failure, check that the CRDs are installed correctly and that the Aviatrix Controller can reach the cluster.