Skip to content

Commit 0c40b0a

Browse files
authored
Apply pencil edits for blocking issues from PR review
1 parent e3db85b commit 0c40b0a

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

articles/aks/limit-egress-traffic.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -161,7 +161,7 @@ Azure automatically routes traffic between Azure subnets, virtual networks, and
161161
az network route-table route create -g $RG --name $FWROUTE_NAME_INTERNET --route-table-name $FWROUTE_TABLE_NAME --address-prefix $FWPUBLIC_IP/32 --next-hop-type Internet
162162
```
163163
164-
For information on how to override Azure's default system routes or add aditional routes to a subnet's route table, see the [virtual network route table documentation](../virtual-network/virtual-networks-udr-overview.md#user-defined).
164+
For information on how to override Azure's default system routes or add additional routes to a subnet's route table, see the [virtual network route table documentation](../virtual-network/virtual-networks-udr-overview.md#user-defined).
165165
166166
### Add firewall rules
167167
@@ -241,7 +241,7 @@ az aks create -g $RG -n $AKSNAME -l $LOC \
241241

242242
### Create user-assigned identities
243243

244-
If you don't have user-assigned identites, follow the steps in this section. If you already have user-assigned identities, skip to [Create an AKS cluster with user-assigned identities](#create-an-aks-cluster-with-user-assigned-identities).
244+
If you don't have user-assigned identities, follow the steps in this section. If you already have user-assigned identities, skip to [Create an AKS cluster with user-assigned identities](#create-an-aks-cluster-with-user-assigned-identities).
245245

246246
1. Create a control plane managed identity using the [`az identity create`][az-identity-create] command.
247247

@@ -564,7 +564,7 @@ You can now start exposing services and deploying applications to this cluster.
564564
>
565565
> When you use Azure Firewall to restrict egress traffic and create a UDR to force all egress traffic, make sure you create an appropriate DNAT rule in Azure Firewall to correctly allow ingress traffic. Using Azure Firewall with a UDR breaks the ingress setup due to asymmetric routing. The issue occurs if the AKS subnet has a default route that goes to the firewall's private IP address, but you're using a public load balancer - ingress or Kubernetes service of type `loadBalancer`. In this case, the incoming load balancer traffic is received via its public IP address, but the return path goes through the firewall's private IP address. Because the firewall is stateful, it drops the returning packet because the firewall isn't aware of an established session. To learn how to integrate Azure Firewall with your ingress or service load balancer, see [Integrate Azure Firewall with Azure Standard Load Balancer](../firewall/integrate-lb.md).
566566
567-
To configure inbound connectivity, you need to write a DNAT rule to the Azure Firewall. To test connectivity to your cluster, a rule is defined for the firewall frontend public IP address to route to the internal IP exposed by the internal service.The destination address can be customized. The translated address must be the IP address of the internal load balancer. The translated port must be the exposed port for your Kubernetes service. You also need to specify the internal IP address assigned to the load balancer created by the Kubernetes service.
567+
To configure inbound connectivity, you need to write a DNAT rule to the Azure Firewall. To test connectivity to your cluster, a rule is defined for the firewall frontend public IP address to route to the internal IP exposed by the internal service. The destination address can be customized. The translated address must be the IP address of the internal load balancer. The translated port must be the exposed port for your Kubernetes service. You also need to specify the internal IP address assigned to the load balancer created by the Kubernetes service.
568568
569569
1. Get the internal IP address assigned to the load balancer using the `kubectl get services` command.
570570

articles/aks/outbound-rules-control-egress.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -161,8 +161,8 @@ If you choose to block/not allow these FQDNs, the nodes will only receive OS upd
161161

162162
There are two options to provide access to Azure Monitor for containers:
163163

164-
1. Allow the Azure Monitor [ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags).
165-
2. Provide access to the required FQDN/application rules.
164+
- Allow the Azure Monitor [ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags).
165+
- Provide access to the required FQDN/application rules.
166166

167167
#### Required network rules
168168

0 commit comments

Comments
 (0)