Skip to content

Commit 97015b5

Browse files
Merge pull request #252790 from schaffererin/outboundtypeudraksroutetable
adding links to custom UDR and custom outbound type docs for AKS
2 parents b9f7b32 + d02f075 commit 97015b5

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

articles/aks/configure-kubenet.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,7 @@ With *Azure CNI*, each pod receives an IP address in the IP subnet and can commu
5050

5151
* An additional hop is required in the design of kubenet, which adds minor latency to pod communication.
5252
* Route tables and user-defined routes are required for using kubenet, which adds complexity to operations.
53+
* For more information, see [Customize cluster egress with a user-defined routing table in AKS](./egress-udr.md) and [Customize cluster egress with outbound types in AKS](./egress-outboundtype.md).
5354
* Direct pod addressing isn't supported for kubenet due to kubenet design.
5455
* Unlike Azure CNI clusters, multiple kubenet clusters can't share a subnet.
5556
* AKS doesn't apply Network Security Groups (NSGs) to its subnet and doesn't modify any of the NSGs associated with that subnet. If you provide your own subnet and add NSGs associated with that subnet, you must ensure the security rules in the NSGs allow traffic between the node and pod CIDR. For more details, see [Network security groups][aks-network-nsg].
@@ -86,7 +87,7 @@ The following considerations help outline when each network model may be the mos
8687
* Most of the pod communication is within the cluster.
8788
* You don't need advanced AKS features, such as virtual nodes or Azure Network Policy.
8889

89-
***Use *Azure CNI* when**:
90+
**Use *Azure CNI* when**:
9091

9192
* You have available IP address space.
9293
* Most of the pod communication is to resources outside of the cluster.
@@ -247,7 +248,7 @@ kubenet networking requires organized route table rules to successfully route re
247248
> [!NOTE]
248249
> When you create and use your own VNet and route table with the kubenet network plugin, you need to use a [user-assigned control plane identity][bring-your-own-control-plane-managed-identity]. For a system-assigned control plane identity, you can't retrieve the identity ID before creating a cluster, which causes a delay during role assignment.
249250
>
250-
> Both system-assigned and user-assigned managed identities are supported when you create and use your own VNet and route table with the azure network plugin. We highly recommend using a user-assigned managed identity for BYO scenarios.
251+
> Both system-assigned and user-assigned managed identities are supported when you create and use your own VNet and route table with the Azure network plugin. We highly recommend using a user-assigned managed identity for BYO scenarios.
251252
252253
### Add a route table with a user-assigned managed identity to your AKS cluster
253254

0 commit comments

Comments
 (0)