Skip to content

Commit 7b73157

Browse files
committed
Updated doc per feedback - added callout regarding outbound connectivity issue
1 parent 1272058 commit 7b73157

File tree

1 file changed

+1
-0
lines changed

1 file changed

+1
-0
lines changed

articles/aks/limit-egress-traffic.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -151,6 +151,7 @@ Azure automatically routes traffic between Azure subnets, virtual networks, and
151151
> Outbound type of UDR requires a route for 0.0.0.0/0 and a next hop destination of NVA in the route table.
152152
> The route table already has a default 0.0.0.0/0 to the Internet. Without a public IP address for Azure to use for Source Network Address Translation (SNAT), simply adding this route won't provide you outbound Internet connectivity. AKS validates that you don't create a 0.0.0.0/0 route pointing to the Internet but instead to a gateway, NVA, etc.
153153
> When using an outbound type of UDR, a load balancer public IP address for **inbound requests** isn't created unless you configure a service of type *loadbalancer*. AKS never creates a public IP address for **outbound requests** if you set an outbound type of UDR.
154+
> For more information, see [Outbound rules for Azure Load Balancer](../load-balancer/outbound-rules.md#scenario6out).
154155
155156
1. Create an empty route table to be associated with a given subnet using the [`az network route-table create`][az-network-route-table-create] command. The route table will define the next hop as the Azure Firewall created above. Each subnet can have zero or one route table associated to it.
156157

0 commit comments

Comments
 (0)