Microsoft Azure and AKS

Tigera and Microsoft Azure together deliver security and observability for securing, monitoring, and troubleshooting Linux and Windows containers on Azure

Overview

Calico helps Microsoft Azure users protect their heterogeneous container environment and Kubernetes workloads, detect threats and achieve continuous compliance. Users can apply a standard set of workload access controls, enforce consistent security policies and real-time visualization of services, namespaces, and pod communication. Users can deploy and manage a consistent set of networking and security policies across both Windows and Linux servers hosting Kubernetes clusters on the Microsoft Azure cloud and AKS.

Benefits

Security

Protect your container and Kubernetes workloads running on Microsoft Azure Kubernetes Service (AKS) and applications with pod-level access controls

Compliance

Create and enforce compliance policies in AKS and Microsoft Azure as per regulatory and organizational requirements

Observability

Identify and resolve connectivity issues and security policy violations between namespaces, microservices, and pods in AKS and Microsoft Azure

Top Use Cases

Workload Access Controls

Security teams need to control the flow of data between Kubernetes clusters and external resources, in order to mitigate the risk of unauthorized access to applications and data, exposure of sensitive data such as personally identifiable information (PII), and introduction of malware and ransomware.

Implement pod-level workload access controls and protect containerized environments in Microsoft Azure and AKS from outside threats, while enabling applications and workloads to securely communicate with resources outside the cluster behind a firewall or other control point.

Regulatory and Compliance

Businesses, subject to corporate and/or regulatory compliance requirements, need to isolate workloads containing sensitive data or restrict access to specific resources. Auditors need proof of control enforcement, but capturing the information required to show proof is challenging, especially in a dynamic, distributed microservices environment where containers are short lived.

Create compliance policies for any compliance framework including PCI, SOC 2, and more. Continuously monitor compliance for your container, Kubernetes, and cloud environment. Retain a daily history of your compliance status. Generate on-demand or scheduled audit reports.

Faster Troubleshooting

Kubernetes workloads are highly dynamic, ephemeral, and are deployed on a distributed and agile infrastructure. As a result, fast troubleshooting of Kubernetes workloads is challenging. Teams require better visibility, and contextual information for microservices, their dependencies, how they are interconnected, and which other clients and applications access them.

Enable faster troubleshooting of Kubernetes workloads and applications with Dynamic Service Graph, Dynamic Packet Capture, anomaly detection, and performance hotspots, leading to shorter time-to-resolution, less application downtime, and improved quality of service.

Quick Start

Developers and administrators who want to apply security-policy enforcement to Microsoft Azure or AKS clusters can get started with Calico Cloud in just a few minutes. Calico Cloud provides a rich networking and security policy model for Windows and Linux containers and Kubernetes that helps secure communications by controlling traffic flows.

How It Works

Calico provides a common networking and security policy model, using Kubernetes constructs like labels and selectors to control and restrict access to specific namespaces, microservices, and pods in both Linux and Windows environments.

Key Capabilities

Get Started

Getting started with Calico and Microsoft AKS is easy.
Everything you need to get Calico installed and configured in your Microsoft Azure AKS cluster is available here:

User Guide

Learn More

Resources

Azure Marketplace

Learn More

Blog

Learn More

Workshop

Learn More

Become a Tigera Partner