You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/limit-egress-traffic.md
+5Lines changed: 5 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -248,6 +248,11 @@ The following FQDN / application rules are required for using cluster extensions
248
248
|**`<region>.dp.kubernetesconfiguration.azure.us`**|**`HTTPS:443`**| This address is used to fetch configuration information from the Cluster Extensions service and report extension status to the service. |
249
249
|**`mcr.microsoft.com, *.data.mcr.microsoft.com`**|**`HTTPS:443`**| This address is required to pull container images for installing cluster extension agents on AKS cluster.|
250
250
251
+
252
+
253
+
> [!NOTE]
254
+
> If any addon does not explicitly stated here, that means the core requirements are covering it.
255
+
251
256
## Restrict egress traffic using Azure firewall
252
257
253
258
Azure Firewall provides an Azure Kubernetes Service (`AzureKubernetesService`) FQDN Tag to simplify this configuration.
0 commit comments