Skip to content

Commit c07d5b5

Browse files
committed
Add restriction note
1 parent 1463d06 commit c07d5b5

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

articles/managed-grafana/how-to-connect-to-data-source-privately.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,9 @@ While managed private endpoints are free, there may be charges associated with p
2121
> [!NOTE]
2222
> Managed private endpoints are currently only available in Azure Global.
2323

24+
> [!NOTE]
25+
> Due to a Kubernetes limitation, if you're running a private data source in an AKS cluster, when the service’s `externalTrafficPolicy` is set to Local, Azure Private Link Service needs to use a different subnet from Pod’s subnet. If the same subnet is required, the service should use Cluster `externalTrafficPolicy`. See [Cloud Provider Azure](https://cloud-provider-azure.sigs.k8s.io/topics/pls-integration/#restrictions).
26+
2427
## Supported data sources
2528

2629
Managed private endpoints work with Azure services that support private link. Using them, you can connect your Azure Managed Grafana workspace to the following Azure data stores over private connectivity:

0 commit comments

Comments
 (0)