You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -185,7 +185,7 @@ Following is an example of setting up firewall rules, and testing your outbound
185
185
186
186
1. In Rules, add a network rule with the subnet as the source address, and specify an FQDN destination.
187
187
188
-
1. You're required to add AKS & HDInsight on AKS rules for allowing traffic for the cluster to function.
188
+
1. You need to add AKS and HDInsight on AKS rules for allowing traffic for the cluster to function. (AKS ApiServer need to be added after the clusterPool is created because you only can get the AKS ApiServer after creating the clusterPool).
189
189
190
190
1. You can also add the private endpoints for any dependent resources in the same subnet for cluster to access them (example – storage).
191
191
@@ -240,7 +240,7 @@ The well-know FQDN is like a public cluster, but it can only be resolved to a CN
240
240
> HDInsight on AKS creates private DNS zone in the cluster pool, virtual network. If your client applications are in same virtual network, you need not configure the private DNS zone again. In case you're using a client application in a different virtual network, you're required to use virutal network peering to bind to private dns zone in the cluster pool virtual network or use private endpoints in the virutal network, and private dns zones, to add the A-record to the private endpoint private IP.
0 commit comments