Skip to content

Commit dbc290c

Browse files
committed
remove inline k8s and add no proxy reqs
1 parent a54e71b commit dbc290c

File tree

1 file changed

+17
-4
lines changed

1 file changed

+17
-4
lines changed

articles/azure-arc/resource-bridge/network-requirements.md

Lines changed: 17 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Azure Arc resource bridge (preview) network requirements
33
description: Learn about network requirements for Azure Arc resource bridge (preview) including URLs that must be allowlisted.
44
ms.topic: conceptual
5-
ms.date: 01/27/2023
5+
ms.date: 01/30/2023
66
---
77

88
# Azure Arc resource bridge (preview) network requirements
@@ -35,9 +35,7 @@ DNS Server must have internal and external endpoint resolution. The appliance VM
3535

3636
## Additional network requirements
3737

38-
In addition, resource bridge (preview) requires connectivity to the Arc-enabled Kubernetes endpoints.
39-
40-
[!INCLUDE [network-requirements](../kubernetes/includes/network-requirements.md)]
38+
In addition, resource bridge (preview) requires connectivity to the [Arc-enabled Kubernetes endpoints](../network-requirements-consolidated.md?tabs=azure-cloud).
4139

4240
> [!NOTE]
4341
> The URLs listed here are required for Arc resource bridge only. Other Arc products (such as Arc-enabled VMware vSphere) may have additional required URLs. For details, see [Azure Arc network requirements](../network-requirements-consolidated.md).
@@ -48,6 +46,21 @@ Azure Arc resource bridge must be configured for proxy so that it can connect to
4846

4947
There are only two certificates that should be relevant when deploying the Arc resource bridge behind an SSL proxy: the SSL certificate for your SSL proxy (so that the host and guest trust your proxy FQDN and can establish an SSL connection to it), and the SSL certificate of the Microsoft download servers. This certificate must be trusted by your proxy server itself, as the proxy is the one establishing the final connection and needs to trust the endpoint. Non-Windows machines may not trust this second certificate by default, so you may need to ensure that it's trusted.
5048

49+
## Exclusion list for excluding private subnets from being sent to the proxy
50+
51+
The following table contains the list of addresses that must be excluded by using the `-noProxy` parameter in [`New-AksHciProxySetting`](./reference/ps/new-akshciproxysetting.md).
52+
53+
| **IP Address** | **Reason for exclusion** |
54+
| ----------------------- | ------------------------------------ |
55+
| localhost, 127.0.0.1 | Localhost traffic |
56+
| .svc | Internal Kubernetes service traffic (.svc) where _.svc_ represents a wildcard name. This is similar to saying \*.svc, but none is used in this schema. |
57+
| 10.0.0.0/8 | private network address space |
58+
| 172.16.0.0/12 |Private network address space - Kubernetes Service CIDR |
59+
| 192.168.0.0/16 | Private network address space - Kubernetes Pod CIDR |
60+
| .contoso.com | You may want to exempt your enterprise namespace (.contoso.com) from being directed through the proxy. To exclude all addresses in a domain, you must add the domain to the `noProxy` list. Use a leading period rather than a wildcard (\*) character. In the sample, the addresses `.contoso.com` excludes addresses `prefix1.contoso.com`, `prefix2.contoso.com`, and so on. |
61+
62+
The default value for `noProxy` is `localhost,127.0.0.1,.svc,10.0.0.0/8,172.16.0.0/12,192.168.0.0/16`. While these default values will work for many networks, you may need to add more subnet ranges and/or names to the exemption list. For example, you may want to exempt your enterprise namespace (.contoso.com) from being directed through the proxy. You can achieve that by specifying the values in the `noProxy` list.
63+
5164
## Next steps
5265

5366
- Review the [Azure Arc resource bridge (preview) overview](overview.md) to understand more about requirements and technical details.

0 commit comments

Comments
 (0)