Skip to content

Commit 8246388

Browse files
committed
Small modifications to get Acrolinx score to 80.
1 parent 7987e6a commit 8246388

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/aks/azure-cni-overlay.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ A separate routing domain is created in the Azure Networking stack for the pod's
2020

2121
![Azure CNI Overlay network model with an AKS cluster](media/azure-cni-overlay/AzureCNI-Overlay.png)
2222

23-
Communication with endpoints outside the cluster, such as on-premises and peered VNets, happens using the node IP through Network Address Translation. Azure CNI translates the source IP (overlay IP of the pod) of the traffic to the primary IP address of the VM, which enables the Azure Networking stack to route the traffic to the destination. Endpoints outside the cluster cannot connect to a pod directly. You will have to publish the pod's application as a Kubernetes Load Balancer service to make it reachable on the VNet.
23+
Communication with endpoints outside the cluster, such as on-premises and peered VNets, happens using the node IP through Network Address Translation. Azure CNI translates the source IP (overlay IP of the pod) of the traffic to the primary IP address of the VM, which enables the Azure Networking stack to route the traffic to the destination. Endpoints outside the cluster can't connect to a pod directly. You will have to publish the pod's application as a Kubernetes Load Balancer service to make it reachable on the VNet.
2424

2525
Outbound (egress) connectivity to the internet for overlay pods can be provided using a [Standard SKU Load Balancer](./egress-outboundtype.md#outbound-type-of-loadbalancer) or [Managed NAT Gateway](./nat-gateway.md). You can also control egress traffic by directing it to a firewall using [User Defined Routes on the cluster subnet](./egress-outboundtype.md#outbound-type-of-userdefinedrouting).
2626

@@ -42,7 +42,7 @@ Like Azure CNI Overlay, Kubenet assigns IP addresses to pods from an address spa
4242

4343
* **Cluster Nodes**: Cluster nodes go into a subnet in your VNet, so ensure that you have a subnet big enough to account for future scale. A simple `/24` subnet can host up to 251 nodes (the first three IP addresses in a subnet are reserved for management operations).
4444

45-
* **Pods**: The overlay solution assigns a `/24 address space for pods on every node from the private CIDR that you specify during cluster creation. The \/24 size is fixed and cannot be increased or decreased. You can run up to 250 pods on a node. When planning the pod address space, ensure that the private CIDR is large enough to provide \/24` address spaces for new nodes to support future cluster expansion.
45+
* **Pods**: The overlay solution assigns a `/24 address space for pods on every node from the private CIDR that you specify during cluster creation. The \/24 size is fixed and can't be increased or decreased. You can run up to 250 pods on a node. When planning the pod address space, ensure that the private CIDR is large enough to provide \/24` address spaces for new nodes to support future cluster expansion.
4646
The following are additional factors to consider when planning pod address space:
4747
* Pod CIDR space must not overlap with the cluster subnet range.
4848
* Pod CIDR space must not overlap with IP ranges used in on-premises networks and peered networks.
@@ -78,9 +78,9 @@ Use the traditional VNet option when:
7878
The overlay solution has the following limitations today
7979

8080
* Only available for Linux and not for Windows.
81-
* You cannot deploy multiple overlay clusters in the same subnet.
82-
* Overlay can be enabled only for new clusters. Existing (already deployed) clusters cannot be configured to use overlay.
83-
* You cannot use Application Gateway as an Ingress Controller (AGIC) for an overlay cluster.
81+
* You can't deploy multiple overlay clusters in the same subnet.
82+
* Overlay can be enabled only for new clusters. Existing (already deployed) clusters can't be configured to use overlay.
83+
* You can't use Application Gateway as an Ingress Controller (AGIC) for an overlay cluster.
8484

8585
## Steps to setup overlay clusters
8686

@@ -127,7 +127,7 @@ az aks create -n $clusterName -g $resourceGroup --location $location --network-p
127127

128128
* *Can I configure the size of the address space assigned to each space?*
129129

130-
No, this is fixed at `/24` today and cannot be changed.
130+
No, this is fixed at `/24` today and can't be changed.
131131

132132

133133
* *Can I add more private pod CIDRs to a cluster after the cluster has been created?*

0 commit comments

Comments
 (0)