Skip to content

Commit fd2b938

Browse files
author
Justin
committed
feedback
1 parent 3ec3217 commit fd2b938

File tree

1 file changed

+13
-14
lines changed

1 file changed

+13
-14
lines changed

articles/aks/egress-outboundtype.md

Lines changed: 13 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -49,16 +49,16 @@ az extension update --name aks-preview
4949

5050
## Overview of outbound types in AKS
5151

52-
An AKS cluster can be customized with a unique `outboundType`. There are two options.
53-
1. `loadBalancer`
54-
1. `userDefinedRoute`
52+
An AKS cluster can be customized with a unique `outboundType` of type load balancer or user-defined routing.
5553

5654
> [!IMPORTANT]
5755
> This impacts only the egress traffic of your cluster. See [setting up ingress controllers](ingress-basic.md) for more information.
5856
5957
### Outbound type of loadBalancer
6058

61-
* If `loadBalancer` is set, AKS completes the following setup automatically. The load balancer is used for egress through an AKS assigned public IP. This supports Kubernetes services of type loadBalancer which expect egress out of the load balancer created by the AKS resource provider. The following setup is done by AKS.
59+
If `loadBalancer` is set, AKS completes the following setup automatically. The load balancer is used for egress through an AKS assigned public IP. This supports Kubernetes services of type `loadBalancer`, which expect egress out of the load balancer created by the AKS resource provider.
60+
61+
The following setup is done by AKS.
6262
* A public IP address is provisioned for cluster egress.
6363
* The public IP address is assigned to the load balancer resource.
6464
* Backend pools for the load balancer are setup for agent nodes in the cluster.
@@ -67,17 +67,16 @@ Below is a network topology deployed in AKS clusters by default, which use an `o
6767

6868
![outboundtype-lb](media/egress-outboundtype/outboundtype-lb.png)
6969

70-
### Outbound type of userDefinedRoute
70+
### Outbound type of userDefinedRouting
7171

7272
> [!NOTE]
7373
> This is an advanced networking scenario and requires proper network configuration.
7474
75-
* If `userDefinedRoute` is set, AKS will not automatically configure egress paths. The following is expected to be done by **the user**.
76-
* Cluster must be deployed into an existing virtual network with a subnet that has been configured.
77-
* A valid user-defined route (UDR) must exist on the subnet with outbound connectivity.
78-
* AKS resource provider will deploy a standard load balancer (SLB). This is not configured with any rules and [does not incur a charge until a rule is placed](https://azure.microsoft.com/pricing/details/load-balancer/).
79-
* AKS will **not** automatically provision a public IP address for the SLB frontend.
80-
* AKS will **not** automatically configure the load balancer backend pool.
75+
If `userDefinedRouting` is set, AKS will not automatically configure egress paths. The following is expected to be done by **the user**.
76+
77+
Cluster must be deployed into an existing virtual network with a subnet that has been configured. A valid user-defined route (UDR) must exist on the subnet with outbound connectivity.
78+
79+
AKS resource provider will deploy a standard load balancer (SLB). This is not configured with any rules and [does not incur a charge until a rule is placed](https://azure.microsoft.com/pricing/details/load-balancer/). AKS will **not** automatically provision a public IP address for the SLB frontend. AKS will **not** automatically configure the load balancer backend pool.
8180

8281
## Deploy a cluster with outbound type of UDR and Azure Firewall
8382

@@ -96,7 +95,7 @@ To illustrate the application of a cluster with outbound type using a user-defin
9695

9796
### Set configuration via environment variables
9897

99-
To begin, define a set of environment variables to be used in resource creations.
98+
Define a set of environment variables to be used in resource creations.
10099

101100
```bash
102101
PREFIX="contosofin"
@@ -137,7 +136,7 @@ SUBID=$(az account show -s '<SUBSCRIPTION_NAME_GOES_HERE>' -o tsv --query 'id')
137136

138137
## Create a virtual network with multiple subnets
139138

140-
To begin we will provision a virtual network with three separate subnets, one for the cluster, one for the firewall, and one for service ingress.
139+
Provision a virtual network with three separate subnets, one for the cluster, one for the firewall, and one for service ingress. This provides the initial subnet organization required by the scenario.
141140

142141
![Empty network topology](media/egress-outboundtype/empty-network.png)
143142

@@ -236,7 +235,7 @@ az network route-table route create -g $RG --name $FWROUTE_NAME --route-table-na
236235
az network route-table route create -g $RG --name $FWROUTE_NAME_INTERNET --route-table-name $FWROUTE_TABLE_NAME --address-prefix $FWPUBLIC_IP/32 --next-hop-type Internet
237236
```
238237

239-
See [virtual network and route table documentation](https://docs.microsoft.com/azure/virtual-network/virtual-networks-udr-overview#user-defined) about how you can override Azure's default system routes or add additional routes to a subnet's route table.
238+
See [virtual network route table documentation](../virtual-network/virtual-networks-udr-overview.md#user-defined) about how you can override Azure's default system routes or add additional routes to a subnet's route table.
240239

241240
## Adding network firewall rules
242241

0 commit comments

Comments
 (0)