Skip to content

Commit d7f1928

Browse files
committed
fix links
1 parent fa11865 commit d7f1928

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/data-explorer/vnet-deployment.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -300,7 +300,7 @@ The first step includes checking TCP connectivity using Windows or Linux OS.
300300
Connection to yourcluster.kusto.windows.net 443 port [tcp/https] succeeded!
301301
```
302302
303-
If the test isn't successful, proceed with the following steps. If the test is successful, the issue isn't due to a TCP connectivity issue. Go to [operational issues](#operational-issues) to troubleshoot further.
303+
If the test isn't successful, proceed with the following steps. If the test is successful, the issue isn't due to a TCP connectivity issue. Go to [operational issues](#cluster-creation-and-operations-issues) to troubleshoot further.
304304
305305
2. Check the Network Security Group (NSG)
306306
@@ -324,7 +324,7 @@ If you're experiencing ingestion issues and you suspect it's related to virtual
324324
325325
3. Check security rules configured on cluster's subnet
326326
327-
Make sure cluster's subnet has NSG, UDR and firewall rules are properly configured. In addition, [test network connectivity for all dependent endpoints](#diagnose-virtual-network-with-the-rest-api).
327+
Make sure cluster's subnet has NSG, UDR and firewall rules are properly configured. In addition, test network connectivity for all dependent endpoints.
328328
329329
## Cluster creation and operations issues
330330
@@ -398,7 +398,7 @@ Make sure that the [Network Security Group](/azure/virtual-network/security-over
398398
399399
3. Check route table
400400
401-
If the cluster's subnet has force-tunneling setup to firewall (subnet with a [route table](/azure/virtual-network/virtual-networks-udr-overview) that contains the default route '0.0.0.0/0') make sure that the [management IP addresses](#azure-data-explorer-management-ip-addresses) and [health monitoring IP addresses](#health-monitoring-ip-addresses) have a route with [next hop type](/azure/virtual-network/virtual-networks-udr-overview##next-hop-types-across-azure-tools) *Internet*, and [source address prefix](/azure/virtual-network/virtual-networks-udr-overview#how-azure-selects-a-route) to *'management-ip/32'* and *'health-monitoring-ip/32'*. This is required to prevent asymmetric route issues.
401+
If the cluster's subnet has force-tunneling setup to firewall (subnet with a [route table](/azure/virtual-network/virtual-networks-udr-overview) that contains the default route '0.0.0.0/0') make sure that the [management IP addresses](#azure-data-explorer-management-ip-addresses) and [health monitoring IP addresses](#health-monitoring-addresses) have a route with [next hop type](/azure/virtual-network/virtual-networks-udr-overview##next-hop-types-across-azure-tools) *Internet*, and [source address prefix](/azure/virtual-network/virtual-networks-udr-overview#how-azure-selects-a-route) to *'management-ip/32'* and *'health-monitoring-ip/32'*. This is required to prevent asymmetric route issues.
402402
403403
4. Check firewall rules
404404

0 commit comments

Comments
 (0)