Application becomes inaccessible after applying NSG rule in AKS + Application Gateway setup
I have set up an AKS architecture where my application is accessed through an Azure Application Gateway's public IP. The architecture includes a Virtual Network with multiple subnets:
- One subnet for the Application Gateway
- Another for the AKS
Each of these subnets is associated with a Network Security Group (NSG). The application was accessible without issues through the Application Gateway public IP.
However, after adding a specific NSG rule to one of the subnets (specifically the one associated with either AKS or the Application Gateway), the application became inaccessible. I suspected the rule might be causing the problem, so I deleted the NSG, but the application still remains inaccessible.
What I’ve tried:
Verified that Application Gateway backend health is reporting "Unhealthy."
- Deleted the problematic NSG to roll back changes.
Request:
Could you please help investigate:
Why the application is still inaccessible even after removing the NSG?
Whether any residual configuration or hidden deny rule might be persisting?
How to properly configure NSG rules to secure the architecture without disrupting application availability?
Let me know if you need the subscription ID, resource names, or any diagnostic logs.
Thank you,
Swati
<Mod remove PII>