Skip to content

Commit c35ca26

Browse files
Update articles/aks/concepts-network.md
Co-authored-by: Chase Wilson <[email protected]>
1 parent 48bf2ee commit c35ca26

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/aks/concepts-network.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -154,7 +154,7 @@ The following behavior differences exist between kubenet and Azure CNI:
154154
| Pod-VM connectivity; VM in peered virtual network | Works when initiated by pod | Works both ways | Works when initiated by pod | Works when initiated by pod |
155155
| On-premises access using VPN or Express Route | Works when initiated by pod | Works both ways | Works when initiated by pod | Works when initiated by pod |
156156
| Expose Kubernetes services using a load balancer service, App Gateway, or ingress controller | Supported | Supported | [No Application Gateway Ingress Controller (AGIC) support][azure-cni-overlay#limitations-with-azure-cni-overlay] | Same limitations when using Overlay mode |
157-
| Support for Windows node pools | Not Supported | Supported | [Preview][azure-cni-overlay#limitations-with-azure-cni-overlay] | [Available only for Linux and not for Windows.][azure-cni-powered-by-cilium#limitations] |
157+
| Support for Windows node pools | Not Supported | Supported | Supported | [Available only for Linux and not for Windows.][azure-cni-powered-by-cilium#limitations] |
158158

159159
Regarding DNS, with both kubenet and Azure CNI plugins DNS are offered by CoreDNS, a deployment running in AKS with its own autoscaler. For more information on CoreDNS on Kubernetes, see [Customizing DNS Service](https://kubernetes.io/docs/tasks/administer-cluster/dns-custom-nameservers/). CoreDNS by default is configured to forward unknown domains to the DNS functionality of the Azure Virtual Network where the AKS cluster is deployed. Hence, Azure DNS and Private Zones will work for pods running in AKS.
160160

0 commit comments

Comments
 (0)