Skip to content

Commit 1ab966d

Browse files
author
Sreekanth Iyer (Ushta Te Consultancy Services)
committed
Corrected the hyperlink relative path issue
1 parent ec220e3 commit 1ab966d

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/hdinsight-aks/control-egress-traffic-from-hdinsight-on-aks-clusters.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -185,7 +185,7 @@ Following is an example of setting up firewall rules, and testing your outbound
185185

186186
1. In **Rules**, add a network rule with the subnet as the source address, and specify an FQDN destination.
187187

188-
1. You need to add [AKS](/azure/aks/outbound-rules-control-egress#required-outbound-network-rules-and-fqdns-for-aks-clusters) and [HDInsight on AKS](./secure-traffic-by-firewall-azure-portal#add-network-and-application-rules-to-the-firewall) rules for allowing traffic for the cluster to function. (AKS ApiServer need to be added after the clusterPool is created because you only can get the AKS ApiServer after creating the clusterPool).
188+
1. You need to add [AKS](/azure/aks/outbound-rules-control-egress#required-outbound-network-rules-and-fqdns-for-aks-clusters) and [HDInsight on AKS](./secure-traffic-by-firewall-azure-portal.md#add-network-and-application-rules-to-the-firewall) rules for allowing traffic for the cluster to function. (AKS ApiServer need to be added after the clusterPool is created because you only can get the AKS ApiServer after creating the clusterPool).
189189

190190
1. You can also add the [private endpoints](/azure/hdinsight-aks/secure-traffic-by-firewall-azure-portal#add-network-and-application-rules-to-the-firewall) for any dependent resources in the same subnet for cluster to access them (example – storage).
191191

0 commit comments

Comments
 (0)