Skip to content

Commit 2b4ac8d

Browse files
authored
public repo edits
1 parent d6a6b0b commit 2b4ac8d

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/aks/private-clusters.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -77,17 +77,17 @@ As mentioned, VNet peering is one way to access your private cluster. To use VNe
7777
8. Select **Add**, add the virtual network of the VM, and then create the peering.
7878
9. Go to the virtual network where you have the VM, select **Peerings**, select the AKS virtual network, and then create the peering. If the address ranges on the AKS virtual network and the VM's virtual network clash, peering fails. For more information, see [Virtual network peering][virtual-network-peering].
7979

80-
## Hub and Spoke with Custom DNS
80+
## Hub and spoke with custom DNS
8181

82-
[Hub and spoke architectures](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/hub-spoke) are commonly used for deploying networks in Azure. In many of these deployments, DNS settings in the spoke VNets are configured to reference a central DNS forwarder to allow for on premises and Azure based DNS resolution. When deploying an AKS cluster into such a networking environment, there are some special considerations that must be taken into account.
82+
[Hub and spoke architectures](https://docs.microsoft.com/azure/architecture/reference-architectures/hybrid-networking/hub-spoke) are commonly used to deploy networks in Azure. In many of these deployments, DNS settings in the spoke VNets are configured to reference a central DNS forwarder to allow for on-premises and Azure-based DNS resolution. When deploying an AKS cluster into such a networking environment, there are some special considerations that must be taken into account.
8383

8484
![Private cluster hub and spoke](media/private-clusters/aks-private-hub-spoke.png)
8585

86-
1. By default, when a private cluster is provisioned, a private endpoint (1) and a private DNS zone (2) are created in the cluster managed resource group. The cluster uses a CNAME record in the private zone to resolve the IP of the private endpoint for communication to the API server.
86+
1. By default, when a private cluster is provisioned, a private endpoint (1) and a private DNS zone (2) are created in the cluster managed resource group. The cluster uses an A record in the private zone to resolve the IP of the private endpoint for communication to the API server.
8787

88-
2. The private zone is linked only to the VNet that the cluster nodes are attached to (3). This means that the endpoint can only be resolved by hosts in that VNet. In scenarios where no custom DNS is configured on the VNet (default), this works without issue as hosts point at 168.63.129.16 for DNS which can resolve records in the private zone due to the link.
88+
2. The private DNS zone is linked only to the VNet that the cluster nodes are attached to (3). This means that the private endpoint can only be resolved by hosts in that linked VNet. In scenarios where no custom DNS is configured on the VNet (default), this works without issue as hosts point at 168.63.129.16 for DNS which can resolve records in the private DNS zone due to the link.
8989

90-
3. In scenarios where the VNet containing your cluster has custom DNS settings (4), cluster deployment will fail unless the private zone is linked to the VNet containing the custom DNS resolvers (5). This link can be created manually once the private zone is created during cluster provisioning or via automation upon detection of creation of the zone using Azure Policy or other event based deployment mechanisms (EventGrid / Functions, etc.)
90+
3. In scenarios where the VNet containing your cluster has custom DNS settings (4), cluster deployment fails unless the private DNS zone is linked to the VNet that contains the custom DNS resolvers (5). This link can be created manually after the private zone is created during cluster provisioning or via automation upon detection of creation of the zone using Azure Policy or other event-based deployment mechanisms (for example, Azure Event Grid and Azure Functions).
9191

9292
## Dependencies
9393

0 commit comments

Comments
 (0)