Skip to content

[Retirement] Migrate from acs-mirror.azureedge.net to packages.aks.azure.com - Egress requirement change for AKS clusters #4792

Open
@rahulrai-in

Description

@rahulrai-in

Due to the Edgio retirement, Azure Kubernetes Service (AKS) is updating its egress requirements. The FQDN acs-mirror.azureedge.net:443—currently used to download and install binaries for necessary dependencies (e.g., kubenet and Azure CNI)—will experience degraded performance starting April 30, 2025, and will be fully retired on May 31, 2025.

Required action

If you use a Layer 7 (FQDN) firewall to restrict AKS egress traffic, action may be required:

1. Azure Firewall with AzureKubernetesService FQDN Tag
If you rely on Azure Firewall Application rules with the AzureKubernetesService FQDN tag, no action is needed. The update will be applied automatically.

2. Other Firewalls or Egress Restrictions
If you restrict egress using another solution (not Azure Firewall as described above), you must add packages.aks.azure.com:443 to your allowed egress list by May 31, 2025. After this date, new AKS VHD images will require access to this hostname to successfully provision.

Updated Egress rules for AKS clusters are available in the Microsoft Learn documentation.

FAQs

Q. What are the destination IP addresses of the host packages.aks.azure.com and acs-mirror.azureedge.net?

Because of the CDN’s dynamic nature, these fully qualified domain names (FQDNs) can map to different Point of Presence (PoP) IP addresses over time or use multiple IPs simultaneously for optimal performance and high availability. As a result, AKS does not guarantee a fixed or static set of destination IP addresses. We recommend that customers allow outbound access to the FQDNs packages.aks.azure.com and acs-mirror.azureedge.net through a Layer 7 network appliance such as the Azure Firewall.

Q. What happens if I do not update my firewall to allow access to the new FQDN by May 31, 2025?

When you perform cluster or Nodepool upgrades, your AKS cluster nodes will use the new Virtual Hard Disk (VHD) image and download necessary binaries from the new FQDN. If you do not update your firewall to allow access to the new FQDN by the full deprecation date, May 31st, 2025, the nodes will fail to be provisioned, and your upgrade operation will fail. However, the existing nodes will continue to function until they are replaced by AKS Node Auto-Healing or a Nodepool upgrade.

Q. How long do I need to allow access to the old FQDN acs-mirror.azureedge.net:443?

New VHD images that reference the new FQDN-packages.aks.azure.com will be released in March 2025. After the new VHD images are applied to all the nodes of your AKS cluster, you can safely remove access to the old FQDN.

Q. What happens if my AKS cluster has the node auto-upgrade OS feature enabled, and it updates the cluster nodes to the new VHD that accesses the new FQDN before I add the new FQDN to my firewall rules?

We are implementing a fallback logic in the new VHDs that tries to access the old FQDN if it fails to access the new FQDN-packages.aks.azure.com. You might experience a small latency due to this fallback operation, but your node will still successfully provision.

Q. What happens if my cluster cannot upgrade to the new VHD image that accesses the new FQDN?

Please note that after May 31,2025, the acs-mirror.azureedge.net CDN endpoint will no longer function and therefore any operation that that causes the nodes to be replaced-such as the Node Auto-Healing-will fail to operate. If you are on a legacy Kubernetes cluster, we recommend following our extensive AKS Migration Guide to migrate to a new AKS cluster.

Help and Support

If you have questions, get answers from community experts in Microsoft Q&A. If you have a support plan and you need technical help, create a support request.

Metadata

Metadata

Assignees

Labels

announcementdeprecationIssue relates to a deprecation of a feature or capability in AKS

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions