Skip to content

Commit a84de24

Browse files
authored
Update limit-egress-traffic.md
1 parent 28ba84d commit a84de24

File tree

1 file changed

+6
-3
lines changed

1 file changed

+6
-3
lines changed

articles/aks/limit-egress-traffic.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn what ports and addresses are required to control egress traff
44
services: container-service
55
ms.topic: article
66
ms.author: jpalma
7-
ms.date: 06/27/2022
7+
ms.date: 07/05/2022
88
author: palma21
99

1010
#Customer intent: As an cluster operator, I want to restrict egress traffic for nodes to only access defined ports and addresses and improve cluster security.
@@ -477,7 +477,7 @@ az aks create -g $RG -n $AKSNAME -l $LOC \
477477
> [!NOTE]
478478
> For creating and using your own VNet and route table where the resources are outside of the worker node resource group, the CLI will add the role assignment automatically. If you are using an ARM template or other client, you need to use the Principal ID of the cluster managed identity to perform a [role assignment.][add role to identity]
479479
>
480-
> If you are not using the CLI but using your own VNet or route table which are outside of the worker node resource group, it's recommended to use [user-assigned control plane identity][Bring your own control plane managed identity]. For system-assigned control plane identity, we cannot get the identity ID before creating cluster, which causes delay for role assignment to take effect.
480+
> If you are not using the CLI but using your own VNet or route table which are outside of the worker node resource group, it's recommended to use [user-assigned control plane identity][Create an AKS cluster with user-assigned identities]. For system-assigned control plane identity, we cannot get the identity ID before creating cluster, which causes delay for role assignment to take effect.
481481
482482
#### Create an AKS cluster with user-assigned identities
483483

@@ -545,6 +545,9 @@ az aks create -g $RG -n $AKSNAME -l $LOC \
545545
--assign-kubelet-identity <kubelet-identity-resource-id>
546546
```
547547

548+
> [!NOTE]
549+
> For creating and using your own VNet and route table where the resources are outside of the worker node resource group, the CLI will add the role assignment automatically. If you are using an ARM template or other client, you need to use the Principal ID of the cluster managed identity to perform a [role assignment.][add role to identity]
550+
548551
### Enable developer access to the API server
549552

550553
If you used authorized IP ranges for the cluster on the previous step, you must add your developer tooling IP addresses to the AKS cluster list of approved IP ranges in order to access the API server from there. Another option is to configure a jumpbox with the needed tooling inside a separate subnet in the Firewall's virtual network.
@@ -868,5 +871,5 @@ If you want to restrict how pods communicate between themselves and East-West tr
868871
[aks-faq]: faq.md
869872
[aks-private-clusters]: private-clusters.md
870873
[add role to identity]: use-managed-identity.md#add-role-assignment-for-control-plane-identity
871-
[Bring your own control plane managed identity]: use-managed-identity.md#bring-your-own-control-plane-managed-identity
874+
[Create an AKS cluster with user-assigned identities]: limit-egress-traffic.md#create-an-AKS-cluster-with-user-assigned-identities
872875
[Use a pre-created kubelet managed identity]: use-managed-identity.md#use-a-pre-created-kubelet-managed-identity

0 commit comments

Comments
 (0)