Skip to content

Commit 7e137f2

Browse files
Merge pull request #252646 from schaffererin/azurefwilbsnataks
Update article to document limitation in ILB and UDR
2 parents be6edf6 + 7b73157 commit 7e137f2

File tree

1 file changed

+6
-0
lines changed

1 file changed

+6
-0
lines changed

articles/aks/limit-egress-traffic.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -147,6 +147,12 @@ You need to configure Azure Firewall inbound and outbound rules. The main purpos
147147
148148
Azure automatically routes traffic between Azure subnets, virtual networks, and on-premises networks. If you want to change any of Azure's default routing, you can create a route table.
149149
150+
> [!IMPORTANT]
151+
> Outbound type of UDR requires a route for 0.0.0.0/0 and a next hop destination of NVA in the route table.
152+
> The route table already has a default 0.0.0.0/0 to the Internet. Without a public IP address for Azure to use for Source Network Address Translation (SNAT), simply adding this route won't provide you outbound Internet connectivity. AKS validates that you don't create a 0.0.0.0/0 route pointing to the Internet but instead to a gateway, NVA, etc.
153+
> When using an outbound type of UDR, a load balancer public IP address for **inbound requests** isn't created unless you configure a service of type *loadbalancer*. AKS never creates a public IP address for **outbound requests** if you set an outbound type of UDR.
154+
> For more information, see [Outbound rules for Azure Load Balancer](../load-balancer/outbound-rules.md#scenario6out).
155+
150156
1. Create an empty route table to be associated with a given subnet using the [`az network route-table create`][az-network-route-table-create] command. The route table will define the next hop as the Azure Firewall created above. Each subnet can have zero or one route table associated to it.
151157
152158
```azurecli

0 commit comments

Comments
 (0)