You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
## AKS clusters with different virtual network or subnet configurations
16
+
## Virtual network or subnet configurations
17
17
18
18
Your AKS cluster may have a different virtual network or subnet configuration to restrict ingress or egress traffic for your AKS cluster. For example, your cluster may be behind a firewall, such as Azure Firewall, or you might use Network Security Groups or custom roles for restricting network traffic.
19
19
@@ -48,19 +48,19 @@ Azure Dev Spaces allows you to communicate directly with a pod in a dev space on
48
48
49
49
Azure Dev Spaces provides routing between pods across namespaces. For example, namespaces with Azure Dev Spaces enabled can have a parent/child relationship, which allows network traffic to be routed between pods across the parent and child namespaces. For this feature to work, add a network policy that allows traffic between namespaces where network traffic is routed, such as parent/child namespaces. Also, if the ingress controller is deployed to the *azds* namespace, then the ingress controller needs to communicate with pods instrumented by Azure Dev Space in a different namespace. For the ingress controller to function properly, network traffic must be allowed from the *azds* namespace to the namespace where the instrumented pods are running.
50
50
51
-
## Using Azure Container Networking with Azure Dev Spaces
51
+
## Using Azure CNI
52
52
53
53
By default, AKS clusters are configured to use [kubenet][aks-kubenet] for networking, which works with Azure Dev Spaces. You can also configure your AKS cluster to use [Azure Container Networking Interface (CNI)][aks-cni]. To use Azure Dev Spaces with Azure CNI on your AKS cluster, allow your virtual network and subnet address spaces up to 10 private IP addresses for pods deployed by Azure Dev Spaces. More details on allowing private IP addresses are available in the [AKS Azure CNI documentation][aks-cni-ip-planning].
54
54
55
-
## Using API server authorized IP ranges with Azure Dev Spaces
55
+
## Using API server authorized IP ranges
56
56
57
57
AKS clusters allow you to configure additional security that limits which IP address can interact with your clusters, for example using custom virtual networks or [securing access to the API server using authorized IP ranges][aks-ip-auth-ranges]. To use Azure Dev Spaces when using this additional security while [creating][aks-ip-auth-range-create] your cluster, you must [allow additional ranges based on your region][dev-spaces-ip-auth-range-regions]. You can also [update][aks-ip-auth-range-update] an existing cluster to allow those additional ranges. You also need to allow the IP address of any development machines that connect to your AKS cluster for debugging to connect to your API server.
58
58
59
-
## Using AKS private clusters with Azure Dev Spaces
59
+
## Using AKS private clusters
60
60
61
61
At this time, Azure Dev Spaces is not supported with [AKS private clusters][aks-private-clusters].
62
62
63
-
## Azure Dev Spaces client requirements
63
+
## Client requirements
64
64
65
65
Azure Dev Spaces uses client-side tooling, such as the Azure Dev Spaces CLI extension, Visual Studio Code extension, and Visual Studio extension, to communicate with your AKS cluster for debugging. To use the Azure Dev Spaces client-side tooling, allow traffic from the development machines to the *azds-\*.azds.io* domain. See *dataplaneFqdn* in `USERPROFILE\.azds\settings.json` for the exact FQDN. If using [API server authorized IP ranges][auth-range-section], you also need to allow the IP address of any development machines that connect to your AKS cluster for debugging to connect to your API server.
66
66
@@ -80,7 +80,7 @@ Learn how Azure Dev Spaces helps you develop more complex applications across mu
Copy file name to clipboardExpand all lines: articles/dev-spaces/faq.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,15 +29,15 @@ Yes, you can configure your own ingress with HTTPS using [traefik][ingress-https
29
29
30
30
## Can I use Azure Dev Spaces on a cluster that uses CNI rather than kubenet?
31
31
32
-
Yes, you can use Azure Dev Spaces on an AKS cluster that uses CNI for networking. For example, you can use Azure Dev Spaces on an AKS cluster with [existing Windows containers][windows-containers], which uses CNI for networking. More information on using CNI for networking with Azure Dev Spaces is available [here](configure-networking.md#using-azure-container-networking-with-azure-dev-spaces).
32
+
Yes, you can use Azure Dev Spaces on an AKS cluster that uses CNI for networking. For example, you can use Azure Dev Spaces on an AKS cluster with [existing Windows containers][windows-containers], which uses CNI for networking. More information on using CNI for networking with Azure Dev Spaces is available [here](configure-networking.md#using-azure-cni).
33
33
34
34
## Can I use Azure Dev Spaces with Windows Containers?
35
35
36
36
Currently, Azure Dev Spaces is intended to run on Linux pods and nodes only, but you can run Azure Dev Spaces on an AKS cluster with [existing Windows containers][windows-containers].
37
37
38
38
## Can I use Azure Dev Spaces on AKS clusters with API server authorized IP address ranges enabled?
39
39
40
-
Yes, you can use Azure Dev Spaces on AKS clusters with [API server authorized IP address ranges][aks-auth-range] enabled. More information on using an AKS clusters with API server authorized IP address ranges enabled with Azure Dev Spaces is available [here](configure-networking.md#using-api-server-authorized-ip-ranges-with-azure-dev-spaces).
40
+
Yes, you can use Azure Dev Spaces on AKS clusters with [API server authorized IP address ranges][aks-auth-range] enabled. More information on using an AKS clusters with API server authorized IP address ranges enabled with Azure Dev Spaces is available [here](configure-networking.md#using-api-server-authorized-ip-ranges).
41
41
42
42
### Can I use Azure Dev Spaces on AKS clusters with restricted egress traffic for cluster nodes?
0 commit comments