You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/egress-outboundtype.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,9 +72,10 @@ For more information, see [configuring cluster egress via user-defined routing](
72
72
73
73
Changing the outbound type after cluster creation will deploy or remove resources as required to put the cluster into the new egress configuration.
74
74
75
+
Migration is only supported between `loadBalancer`, `managedNATGateway` (if using a managed virtual network), and `userDefinedNATGateway` (if using a custom virtual network).
76
+
75
77
> [!WARNING]
76
-
> - Changing the outbound type on a cluster is disruptive to network connectivity and will result in a change of the cluster's egress IP address. If any firewall rules have been configured to restrict traffic from the cluster, they will need to be updated to match the new egress IP address.
77
-
> - Changing to the `userDefinedRouting` egress type may require changing how incoming load balancer traffic flows, as egress traffic will now flow via the user-defined route instead of back via the load balancer, leading to asymmetric routing and dropped traffic. For more information, see the [user-defined routing documentation](egress-udr.md).
78
+
> Changing the outbound type on a cluster is disruptive to network connectivity and will result in a change of the cluster's egress IP address. If any firewall rules have been configured to restrict traffic from the cluster, they will need to be updated to match the new egress IP address.
78
79
79
80
[!INCLUDE [preview features callout](includes/preview/preview-callout.md)]
80
81
@@ -94,18 +95,18 @@ Run the following command to update to the latest version of the extension relea
94
95
az extension update --name aks-preview
95
96
```
96
97
97
-
### Register the 'AKS-OutBoundTypeMigrationPreviewReregistering' feature flag
98
+
### Register the 'AKS-OutBoundTypeMigrationPreview' feature flag
98
99
99
-
Register the `AKS-OutBoundTypeMigrationPreviewReregistering` feature flag by using the [az feature register][az-feature-register] command, as shown in the following example:
100
+
Register the `AKS-OutBoundTypeMigrationPreview` feature flag by using the [az feature register][az-feature-register] command, as shown in the following example:
100
101
101
102
```azurecli-interactive
102
-
az feature register --namespace "Microsoft.ContainerService" --name "AKS-OutBoundTypeMigrationPreviewReregistering"
103
+
az feature register --namespace "Microsoft.ContainerService" --name "AKS-OutBoundTypeMigrationPreview"
103
104
```
104
105
105
106
It takes a few minutes for the status to show *Registered*. Verify the registration status by using the [az feature show][az-feature-show] command:
106
107
107
108
```azurecli-interactive
108
-
az feature show --namespace "Microsoft.ContainerService" --name "AKS-OutBoundTypeMigrationPreviewReregistering"
109
+
az feature show --namespace "Microsoft.ContainerService" --name "AKS-OutBoundTypeMigrationPreview"
109
110
```
110
111
111
112
When the status reflects *Registered*, refresh the registration of the *Microsoft.ContainerService* resource provider by using the [az provider register][az-provider-register] command:
@@ -119,7 +120,7 @@ az provider register --namespace Microsoft.ContainerService
119
120
Run the following command to change a cluster's outbound configuration:
120
121
121
122
```azurecli-interactive
122
-
az aks update -g <resourceGroup> -n <clusterName> --outbound-type <loadBalancer|managedNATGateway|userAssignedNATGateway|userDefinedRouting>
123
+
az aks update -g <resourceGroup> -n <clusterName> --outbound-type <loadBalancer|managedNATGateway|userAssignedNATGateway>
0 commit comments