Skip to content

Commit f91bddf

Browse files
Merge pull request #273158 from schaffererin/bug248105
Fixing typo in command parameter
2 parents 8820b3d + 2ded9d9 commit f91bddf

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/aks/api-server-authorized-ip-ranges.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,8 @@ description: Learn how to secure your cluster using an IP address range for acce
44
ms.topic: article
55
ms.custom: devx-track-azurecli
66
ms.date: 12/26/2023
7+
ms.author: schaffererin
8+
author: schaffererin
79
#Customer intent: As a cluster operator, I want to increase the security of my cluster by limiting access to the API server to only the IP addresses that I specify.
810
---
911

@@ -138,7 +140,7 @@ When you enable API server authorized IP ranges during cluster creation, the out
138140
- Update an existing cluster's API server authorized IP ranges using the [`az aks update`][az-aks-update] command with the `--api-server-authorized-ip-ranges` parameter. The following example updates API server authorized IP ranges on the cluster named *myAKSCluster* in the resource group named *myResourceGroup*. The IP address range to authorize is *73.140.245.0/24*:
139141
140142
```azurecli-interactive
141-
az aks update --resource-group myResourceGroup --name myAKSCluster -api-server-authorized-ip-ranges 73.140.245.0/24
143+
az aks update --resource-group myResourceGroup --name myAKSCluster --api-server-authorized-ip-ranges 73.140.245.0/24
142144
```
143145
144146
You can also use *0.0.0.0/32* when specifying the `--api-server-authorized-ip-ranges` parameter to allow only the public IP of the Standard SKU load balancer.

0 commit comments

Comments
 (0)