You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/limit-egress-traffic.md
+52-54Lines changed: 52 additions & 54 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -96,13 +96,13 @@ Provision a virtual network with two separate subnets: one for the cluster and o
96
96
97
97
You need to configure Azure Firewall inbound and outbound rules. The main purpose of the firewall is to enable organizations to configure granular ingress and egress traffic rules into and out of the AKS cluster.
98
98
99
-

100
-
101
99
> [!IMPORTANT]
102
100
>
103
101
> If your cluster or application creates a large number of outbound connections directed to the same or a small subset of destinations, you might require more firewall frontend IPs to avoid maxing out the ports per frontend IP.
104
102
>
105
-
> For more information on how to create an Azure Firewall with multiple IPs, see [Create an Azure Firewall with multiple public IP addresses using Bicep](../firewall/quick-create-multiple-ip-bicep.md)
103
+
> For more information on how to create an Azure Firewall with multiple IPs, see [Create an Azure Firewall with multiple public IP addresses using Bicep](../firewall/quick-create-multiple-ip-bicep.md).
104
+
105
+

106
106
107
107
1. Create a standard SKU public IP resource using the [`az network public-ip create`][az-network-public-ip-create] command. This resource will be used as the Azure Firewall frontend address.
108
108
@@ -122,13 +122,11 @@ You need to configure Azure Firewall inbound and outbound rules. The main purpos
The IP address created earlier can now be assigned to the firewall frontend.
125
+
Setting up the public IP address to the Azure Firewall may take a few minutes. Once it's ready, the IP address created earlier can be assigned to the firewall front end.
126
126
127
-
> [!NOTE]
128
-
>
129
-
> Setting up the public IP address to the Azure Firewall may take a few minutes.
130
-
>
131
-
> To leverage FQDN on network rules, we need DNS proxy enabled. When DNS proxy is enabled when, the firewall listens on port 53 and forwards DNS requests to the DNS server specified above. This allows the firewall to translate the FQDN automatically.
127
+
> [!NOTE]
128
+
>
129
+
> To leverage FQDN on network rules, we need DNS proxy enabled. When DNS proxy is enabled, the firewall listens on port 53 and forwards DNS requests to the DNS server specified above. This allows the firewall to translate the FQDN automatically.
132
130
133
131
4. Create an Azure Firewall IP configuration using the [`az network firewall ip-config create`][az-network-firewall-ip-config-create] command.
134
132
@@ -143,9 +141,9 @@ The IP address created earlier can now be assigned to the firewall frontend.
> If you use secure access to the AKS API server with [authorized IP address ranges](./api-server-authorized-ip-ranges.md), you need to add the firewall public IP into the authorized IP range.
144
+
> [!NOTE]
145
+
>
146
+
> If you use secure access to the AKS API server with [authorized IP address ranges](./api-server-authorized-ip-ranges.md), you need to add the firewall public IP into the authorized IP range.
149
147
150
148
### Create a UDR with a hop to Azure Firewall
151
149
@@ -253,48 +251,48 @@ If you don't have user-assigned identites, follow the steps in this section. If
253
251
az identity create --name myIdentity --resource-group myResourceGroup
The output should resemble the following example output:
295
278
296
-
> [!NOTE]
297
-
> For creating and using your own VNet and route table where the resources are outside of the worker node resource group, the CLI will add the role assignment automatically. If you're using an ARM template or other client, you need to use the Principal ID of the cluster managed identity to perform a [role assignment][add role to identity].
> If you create your own VNet and route table where the resources are outside of the worker node resource group, the CLI will add the role assignment automatically. If you're using an ARM template or other client, you need to use the Principal ID of the cluster managed identity to perform a [role assignment][add role to identity].
298
296
299
297
### Create an AKS cluster with user-assigned identities
300
298
@@ -576,15 +574,15 @@ To configure inbound connectivity, you need to write a DNAT rule to the Azure Fi
576
574
kubectl get services
577
575
```
578
576
579
-
The IP address will be listed in the `EXTERNAL-IP` column.
577
+
The IP address will be listed in the `EXTERNAL-IP` column, as shown in the following example output:
0 commit comments