Advanced network configuration

On this page

  1. Default network configuration example
  2. Advanced network configuration example
    1. Advanced network configuration options
    2. IP address configuration
      1. AKS subnet
      2. Kubernetes service address range
      3. Kubernetes DNS service IP address
  3. Azure Load Balancer
  4. Internal load balancer
  5. Host name resolution

In this article, you will learn about advanced network configuration options that are available to you during CluedIn installation.

Default network configuration example

The following diagram shows the default network configuration of CluedIn after installation.


Advanced network configuration example

The following diagram shows the advanced network configuration of CluedIn.


Advanced network configuration requires that you have set up the firewall policy. For more information, see Configure firewall.

Advanced network configuration (ingress vNet integration) allows you to specify the vNet and/or subnet address spaces that will be used to deploy your CluedIn platform. If you are deploying into your own network, see the following Microsoft guidelines for planning your Kubernetes networking model:

The CluedIn platform requires using Azure CNI networking plug-in. This plug-in is configured using routable vNet-based IP address at a per pod and node level. You need to plan the IP addressing for your cluster according to your current network topology.

During the CluedIn installation, you will be asked for the Kubernetes service address range. Microsoft default values will work fine with CluedIn. However, these values can be customized, and it is important that your network is planned in accordance with the Microsoft guidance.

CluedIn can operate inside CIDR /23 with 510 available IP addresses. However, this is an absolute minimum configuration, and it does not include any additional services and associated overhead.

Advanced network configuration options

Important! If you do not plan to make any changes to the default out-of-the-box network configuration, you can skip this section and check other configuration-related topics:

When installing CluedIn from the Azure Marketplace, you can set up advanced network configuration on the CluedIn - Advanced Configuration tab. You can choose from the three networking options:

  • Default – a new vNet will be created using default values that may not allow you to integrate with the existing networks.
  • Modify IP ranges – a new vNet will be created with IP address ranges that you specify.
  • Use Existing vNet – an existing vNet will be used and you need to specify both the vNet and the IP address ranges.

The following section focuses on the IP address configuration because it is universal to both the Modify IP ranges and the Use Existing vNet options.

IP address configuration

The following example is based on the CluedIn essential configuration using the default node pool configuration with the existing Azure vNet.


When configuring vNet integration, only the following values need to be changed, unless you have a very specific use case:

  • AKS subnet
  • Kubernetes DNS service IP address
  • Kubernetes service address range

AKS subnet

In the example above, the existing vNet was used to configure the AKS subnet. This is a non-overlapping subnet in the target network space, so it can communicate with other Azure vNets and Azure resources. has a range of–, which is 512 IP addresses in total. The AKS subnet is used to allocate IP address to pods, nodes, and the load balancer IP.

Under a normal operation, the cluster and CluedIn use around 350 addresses, leaving around 162 addresses for scaling, upgrading, and additional services.

Warning! CluedIn can operate inside CIDR /23 with 510 available IP addresses. However, this is an absolute minimum configuration, and it may not provide sufficient headroom in the future or for some scaling scenarios. If CIDR /22 with 1022 IP addresses is available, you will have a little more headroom.

Kubernetes service address range

The Kubernetes service address range shouldn’t be used by any network element on or connected to the ABA-DEV-IMPL-VNET-03 virtual network. The service address CIDR must be less than /12. You can reuse this range across different AKS clusters. In the example, we used, which is sufficient for the current services and any future growth.

Kubernetes DNS service IP address

The Kubernetes DNS service IP address is the IP address within the Kubernetes service address range that will be used by cluster service discovery. Don’t use the first IP address in your address range. The first address in your address range is used for the kubernetes.default.svc.cluster.local address. In the example above, we have selected, which is inside the service CIDR range.  

Azure Load Balancer

If you are using Azure Load Balancer as part of your CluedIn deployment, you need to consider the following security aspects:

  • The cluster identity used by the AKS cluster must have at least Network Contributor permissions on the subnet within your virtual network. Note: On a standard CluedIn instance, this will be the User Assigned Identity rather than Machine Assigned. This is located in the Managed Resource Group.

  • If you want to define a custom role instead of using the built-in Network Contributor role, the following permissions are required:

    • Microsoft.Network/virtualNetworks/subnets/join/action
    • Microsoft.Network/virtualNetworks/subnets/read
    • Microsoft.Authorization/roleAssignments/write

For details on creating custom roles, see Azure custom roles.

Internal load balancer

This section contains a procedure for configuring CluedIn to use your internal load balancer and IP address.


  • You should be comfortable working in either PowerShell or bash terminal via Azure Cloud Shell.
  • You should be connected to your AKS cluster. See Connect to CluedIn cluster for detailed instructions.
  • Your Helm repository is set up.

If you have any questions, you can request CluedIn support by sending an email to (or reach out to your delivery manager if you have a committed deal).

To configure CluedIn to use your load balancer and internal IP address

  1. Download the current cluster configuration file by running the following command:
    helm get values cluedin-platform -n cluedin -o yaml > Cluster-Current-values.yaml

  2. Open the file in nano editor by running the following command:
    nano Cluster-Current-values.yaml

  3. In the file, find a section that looks like the example below.
             loadBalancerIP: {PublicIP} # This will match the allocated Azure Resource

    This section controls the load balancer configuration and associated IP address. The example shows external load balancer with external IP address.

  4. Replace the section that you found with the following section:
             loadBalancerIP: {PrivateIP} # This must be valid in the vNet subnet range
  5. Reconfigure a new load balancer to use your internal IP address. To do this, replace {PrivateIP} with a valid IP address from your AKS subnet range.

    The IP address can be any IP from the range that is not in use by the nodes, pods, or other resources. To verify that the IP address is not in use, look at connected devices in the vNet resource page in the Azure portal.

  6. Save the file and post the new configuration to the cluster by running the following command:
    helm upgrade -i cluedin-platform cluedin/cluedin-platform -n cluedin --values Cluster-Current-values.yaml

    After a short time, a confirmation appears in the console. It means that CluedIn is now configured to use your new load balancer and internal IP address.

    In Azure, you should then see a new Load Balancer resource called kubernetes-internal, which will be used for ingress. The original kubernetes then simply becomes egress only.

Host name resolution

When an internal load balancer is used, it may no longer be possible for the cluedin-server pod to resolve the hostname. This will prevent the application from functioning correctly unless some additional steps are taken to allow resolution.

One way to achieve this is to use an Azure Private DNS zone linked to the kubernetes vnet. The other is to add the hostAlias section to your CluedIn values file which will get passed down to the servers host file.

    - hostnames:
      ip: {privateIP}

If you need assistance with this, please reach out to one of CluedIn’s infrastructure engineers.