Skip to content

Commit 1a15ba1

Browse files
authored
Update api-server-authorized-ip-ranges.md
1 parent 93e3eac commit 1a15ba1

File tree

1 file changed

+7
-1
lines changed

1 file changed

+7
-1
lines changed

articles/aks/api-server-authorized-ip-ranges.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: API server authorized IP ranges in Azure Kubernetes Service (AKS)
33
description: Learn how to secure your cluster using an IP address range for access to the API server in Azure Kubernetes Service (AKS)
44
ms.topic: article
55
ms.custom: devx-track-azurecli
6-
ms.date: 12/26/2023
6+
ms.date: 05/19/2024
77
ms.author: schaffererin
88
author: schaffererin
99
#Customer intent: As a cluster operator, I want to increase the security of my cluster by limiting access to the API server to only the IP addresses that I specify.
@@ -143,6 +143,12 @@ When you enable API server authorized IP ranges during cluster creation, the out
143143
az aks update --resource-group myResourceGroup --name myAKSCluster --api-server-authorized-ip-ranges 73.140.245.0/24
144144
```
145145
146+
- To allow multiple IP address ranges, you can list several IP addresses, separated by commas.
147+
148+
```azurecli-interactive
149+
az aks update --resource-group myResourceGroup --name myAKSCluster --api-server-authorized-ip-ranges 73.140.245.0/24,193.168.1.0/24,194.168.1.0/24
150+
```
151+
146152
You can also use *0.0.0.0/32* when specifying the `--api-server-authorized-ip-ranges` parameter to allow only the public IP of the Standard SKU load balancer.
147153
148154
### [Azure PowerShell](#tab/azure-powershell)

0 commit comments

Comments
 (0)