Skip to content

Commit 5a56cfe

Browse files
authored
fix issues per Acrolinx
1 parent f6851a9 commit 5a56cfe

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/aks/use-network-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ The following example script:
7777
* Creates an Azure Active Directory (Azure AD) service principal for use with the AKS cluster.
7878
* Assigns *Contributor* permissions for the AKS cluster service principal on the virtual network.
7979
* Creates an AKS cluster in the defined virtual network and enables network policy.
80-
* The *azure* network policy option is used. To use Calico as the network policy option instead, use the `--network-policy calico` parameter. Note: Calico could be used with either `--network-plugin azure` or `--network-plugin kubenet`.
80+
* The _Azure Network_ policy option is used. To use Calico as the network policy option instead, use the `--network-policy calico` parameter. Note: Calico could be used with either `--network-plugin azure` or `--network-plugin kubenet`.
8181

8282
Note that instead of using a service principal, you can use a managed identity for permissions. For more information, see [Use managed identities](use-managed-identity.md).
8383

@@ -142,7 +142,7 @@ az aks get-credentials --resource-group $RESOURCE_GROUP_NAME --name $CLUSTER_NAM
142142

143143
## Deny all inbound traffic to a pod
144144

145-
Before you define rules to allow specific network traffic, first create a network policy to deny all traffic. This policy gives you a starting point to begin to whitelist only the desired traffic. You can also clearly see that traffic is dropped when the network policy is applied.
145+
Before you define rules to allow specific network traffic, first create a network policy to deny all traffic. This policy gives you a starting point to begin to create an allow list for only the desired traffic. You can also clearly see that traffic is dropped when the network policy is applied.
146146

147147
For the sample application environment and traffic rules, let's first create a namespace called *development* to run the example pods:
148148

0 commit comments

Comments
 (0)