Skip to content

Commit 297924a

Browse files
authored
Corrected the link issues
Corrected the link issues
1 parent b1d4bae commit 297924a

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/hdinsight-aks/control-egress-traffic-from-hdinsight-on-aks-clusters.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ A public IP created by HDInsight on AKS, and it's an AKS-managed resource, which
5555

5656
When clusters are created, then certain ingress public IPs also get created.
5757

58-
To allow requests to be sent to the cluster, you need to [allowlist the traffic](./secure-traffic-by-nsg#inbound-security-rules-ingress-traffic). You can also configure certain [rules in the NSG ](./secure-traffic-by-nsg#inbound-security-rules-ingress-traffic) to do a coarse-grained control.
58+
To allow requests to be sent to the cluster, you need to [allowlist the traffic](./secure-traffic-by-nsg.md#inbound-security-rules-ingress-traffic). You can also configure certain [rules in the NSG ](./secure-traffic-by-nsg.md#inbound-security-rules-ingress-traffic) to do a coarse-grained control.
5959

6060
### Outbound with user defined routing
6161

@@ -252,7 +252,7 @@ The private FQDN is only for private cluster, recorded as A-RECORD in private DN
252252

253253
- [Azure Virtual Network peering | Microsoft Learn](https://learn.microsoft.com/azure/virtual-network/virtual-network-peering-overview).
254254

255-
- [Outbound traffic on HDInsight on AKS - Azure HDInsight on AKS | Microsoft Learn.](./required-outbound-traffic)
255+
- [Outbound traffic on HDInsight on AKS - Azure HDInsight on AKS | Microsoft Learn.](./required-outbound-traffic.md)
256256

257257
- [Outbound network and FQDN rules for Azure Kubernetes Service (AKS) clusters - Azure Kubernetes Service | Microsoft Learn](https://learn.microsoft.com/azure/aks/outbound-rules-control-egress#azure-global-required-network-rules).
258258

0 commit comments

Comments
 (0)