Skip to content

Commit 521abe8

Browse files
committed
updating broken links
1 parent 8b6b9f2 commit 521abe8

11 files changed

+10
-10
lines changed

articles/aks/egress-udr.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Azure load balancers [don't incur a charge until a rule is placed](https://azure
4242

4343
## Deploy a cluster with outbound type of UDR and Azure Firewall
4444

45-
To illustrate the application of a cluster with outbound type using a user-defined route, a cluster can be configured on a virtual network with an Azure Firewall on its own subnet. See this example on the [restrict egress traffic with Azure firewall example](limit-egress-traffic.md#restrict-egress-traffic-using-azure-firewall).
45+
To illustrate the application of a cluster with outbound type using a user-defined route, a cluster can be configured on a virtual network with an Azure Firewall on its own subnet. See this example on the [restrict egress traffic with Azure firewall example](limit-egress-traffic.md).
4646

4747
> [!IMPORTANT]
4848
> Outbound type of UDR requires there is a route for 0.0.0.0/0 and next hop destination of NVA (Network Virtual Appliance) in the route table.

articles/aks/keda-deploy-add-on-arm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ You can troubleshoot KEDA add-on problems in [this article][keda-troubleshoot].
165165
[az aks update]: /cli/azure/aks#az-aks-update
166166
[az-group-delete]: /cli/azure/group#az-group-delete
167167
[keda-troubleshoot]: /troubleshoot/azure/azure-kubernetes/troubleshoot-kubernetes-event-driven-autoscaling-add-on?context=/azure/aks/context/aks-context
168-
[aks-firewall-requirements]: limit-egress-traffic.md#azure-global-required-network-rules
168+
[aks-firewall-requirements]: outbound-rules-control-egress.md#azure-global-required-network-rules
169169
[az-provider-register]: /cli/azure/provider#az-provider-register
170170
[az-feature-register]: /cli/azure/feature#az-feature-register
171171
[az-feature-show]: /cli/azure/feature#az-feature-show

articles/aks/keda-deploy-add-on-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -182,7 +182,7 @@ You can troubleshoot KEDA add-on problems in [this article][keda-troubleshoot].
182182
[az aks update]: /cli/azure/aks#az-aks-update
183183
[az-group-delete]: /cli/azure/group#az-group-delete
184184
[keda-troubleshoot]: /troubleshoot/azure/azure-kubernetes/troubleshoot-kubernetes-event-driven-autoscaling-add-on?context=/azure/aks/context/aks-context
185-
[aks-firewall-requirements]: limit-egress-traffic.md#azure-global-required-network-rules
185+
[aks-firewall-requirements]: outbound-rules-control-egress.md#azure-global-required-network-rules
186186

187187
[kubectl]: https://kubernetes.io/docs/user-guide/kubectl
188188
[keda]: https://keda.sh/

articles/aks/outbound-rules-control-egress.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,7 @@ If you choose to block/not allow these FQDNs, the nodes will only receive OS upd
128128
| **`us.download.nvidia.com`** | **`HTTPS:443`** | This address is used for correct driver installation and operation on GPU-based nodes. |
129129
| **`download.docker.com`** | **`HTTPS:443`** | This address is used for correct driver installation and operation on GPU-based nodes. |
130130

131-
### Windows Server based node pools required FQDN / application rules
131+
## Windows Server based node pools required FQDN / application rules
132132

133133
| Destination FQDN | Port | Use |
134134
|----------------------------------------------------------------------------|-----------|----------|

articles/aks/secure-egress-traffic.md

Whitespace-only changes.

articles/container-registry/container-registry-troubleshoot-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ Related links:
103103
* [Connect privately to an Azure container registry using Azure Private Link](container-registry-private-link.md)
104104
* [Troubleshoot Azure Private Endpoint connectivity problems](../private-link/troubleshoot-private-endpoint-connectivity.md)
105105
* [Restrict access to a container registry using a service endpoint in an Azure virtual network](container-registry-vnet.md)
106-
* [Required outbound network rules and FQDNs for AKS clusters](../aks/limit-egress-traffic.md#required-outbound-network-rules-and-fqdns-for-aks-clusters)
106+
* [Required outbound network rules and FQDNs for AKS clusters](../aks/outbound-rules-control-egress.md#required-outbound-network-rules-and-fqdns-for-aks-clusters)
107107
* [Kubernetes: Debugging DNS resolution](https://kubernetes.io/docs/tasks/administer-cluster/dns-debugging-resolution/)
108108
* [Virtual network service tags](../virtual-network/service-tags-overview.md)
109109

articles/defender-for-cloud/defender-for-containers-architecture.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ The **Azure Policy add-on for Kubernetes** collects cluster and workload configu
5151
|--|--|--|--|--|--|--|
5252
| microsoft-defender-collector-ds-* | kube-system | [DaemonSet](https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/) | A set of containers that focus on collecting inventory and security events from the Kubernetes environment. | SYS_ADMIN, <br>SYS_RESOURCE, <br>SYS_PTRACE | memory: 296Mi<br> <br> cpu: 360m | No |
5353
| microsoft-defender-collector-misc-* | kube-system | [Deployment](https://kubernetes.io/docs/concepts/workloads/controllers/deployment/) | A set of containers that focus on collecting inventory and security events from the Kubernetes environment that aren't bounded to a specific node. | N/A | memory: 64Mi <br> <br>cpu: 60m | No |
54-
| microsoft-defender-publisher-ds-* | kube-system | [DaemonSet](https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/) | Publish the collected data to Microsoft Defender for Containers backend service where the data will be processed for and analyzed. | N/A | memory: 200Mi  <br> <br> cpu: 60m | Https 443 <br> <br> Learn more about the [outbound access prerequisites](../aks/limit-egress-traffic.md#microsoft-defender-for-containers) |
54+
| microsoft-defender-publisher-ds-* | kube-system | [DaemonSet](https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/) | Publish the collected data to Microsoft Defender for Containers backend service where the data will be processed for and analyzed. | N/A | memory: 200Mi  <br> <br> cpu: 60m | Https 443 <br> <br> Learn more about the [outbound access prerequisites](../aks/outbound-rules-control-egress.md#microsoft-defender-for-containers) |
5555

5656
\* Resource limits aren't configurable; Learn more about [Kubernetes resources limits](https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/#resource-units-in-kubernetes)
5757

articles/defender-for-cloud/includes/defender-for-container-prerequisites-aks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,6 @@ author: bmansheim
1010

1111
Validate the following endpoints are configured for outbound access so that the Defender profile can connect to Microsoft Defender for Cloud to send security data and events:
1212

13-
See the [required FQDN/application rules for Microsoft Defender for Containers](../../aks/limit-egress-traffic.md#microsoft-defender-for-containers).
13+
See the [required FQDN/application rules for Microsoft Defender for Containers](../../aks/outbound-rules-control-egress.md#microsoft-defender-for-containers).
1414

1515
By default, AKS clusters have unrestricted outbound (egress) internet access.

articles/defender-for-cloud/kubernetes-workload-protections.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Microsoft Defender for Cloud includes a bundle of recommendations that are avail
2121

2222
## Prerequisites
2323

24-
- Add the [Required FQDN/application rules for Azure policy](../aks/limit-egress-traffic.md#azure-policy).
24+
- Add the [Required FQDN/application rules for Azure policy](../aks/outbound-rules-control-egress.md#azure-policy).
2525
- (For non AKS clusters) [Connect an existing Kubernetes cluster to Azure Arc](../azure-arc/kubernetes/quickstart-connect-cluster.md).
2626

2727
## Enable Kubernetes data plane hardening

articles/governance/policy/troubleshoot/general.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -314,7 +314,7 @@ This issue occurs when a cluster egress is locked down.
314314

315315
Ensure that the domains and ports mentioned in the following article are open:
316316

317-
- [Required outbound network rules and fully qualified domain names (FQDNs) for AKS clusters](../../../aks/limit-egress-traffic.md#required-outbound-network-rules-and-fqdns-for-aks-clusters)
317+
- [Required outbound network rules and fully qualified domain names (FQDNs) for AKS clusters](../../../aks/outbound-rules-control-egress.md#required-outbound-network-rules-and-fqdns-for-aks-clusters)
318318

319319
### Scenario: The add-on is unable to reach the Azure Policy service endpoint because of the aad-pod-identity configuration
320320

0 commit comments

Comments
 (0)