You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/egress-outboundtype.md
+13-14Lines changed: 13 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,16 +49,16 @@ az extension update --name aks-preview
49
49
50
50
## Overview of outbound types in AKS
51
51
52
-
An AKS cluster can be customized with a unique `outboundType`. There are two options.
53
-
1.`loadBalancer`
54
-
1.`userDefinedRoute`
52
+
An AKS cluster can be customized with a unique `outboundType` of type load balancer or user-defined routing.
55
53
56
54
> [!IMPORTANT]
57
55
> This impacts only the egress traffic of your cluster. See [setting up ingress controllers](ingress-basic.md) for more information.
58
56
59
57
### Outbound type of loadBalancer
60
58
61
-
* If `loadBalancer` is set, AKS completes the following setup automatically. The load balancer is used for egress through an AKS assigned public IP. This supports Kubernetes services of type loadBalancer which expect egress out of the load balancer created by the AKS resource provider. The following setup is done by AKS.
59
+
If `loadBalancer` is set, AKS completes the following setup automatically. The load balancer is used for egress through an AKS assigned public IP. This supports Kubernetes services of type `loadBalancer`, which expect egress out of the load balancer created by the AKS resource provider.
60
+
61
+
The following setup is done by AKS.
62
62
* A public IP address is provisioned for cluster egress.
63
63
* The public IP address is assigned to the load balancer resource.
64
64
* Backend pools for the load balancer are setup for agent nodes in the cluster.
@@ -67,17 +67,16 @@ Below is a network topology deployed in AKS clusters by default, which use an `o
> This is an advanced networking scenario and requires proper network configuration.
74
74
75
-
* If `userDefinedRoute` is set, AKS will not automatically configure egress paths. The following is expected to be done by **the user**.
76
-
* Cluster must be deployed into an existing virtual network with a subnet that has been configured.
77
-
* A valid user-defined route (UDR) must exist on the subnet with outbound connectivity.
78
-
* AKS resource provider will deploy a standard load balancer (SLB). This is not configured with any rules and [does not incur a charge until a rule is placed](https://azure.microsoft.com/pricing/details/load-balancer/).
79
-
* AKS will **not** automatically provision a public IP address for the SLB frontend.
80
-
* AKS will **not** automatically configure the load balancer backend pool.
75
+
If `userDefinedRouting` is set, AKS will not automatically configure egress paths. The following is expected to be done by **the user**.
76
+
77
+
Cluster must be deployed into an existing virtual network with a subnet that has been configured. A valid user-defined route (UDR) must exist on the subnet with outbound connectivity.
78
+
79
+
AKS resource provider will deploy a standard load balancer (SLB). This is not configured with any rules and [does not incur a charge until a rule is placed](https://azure.microsoft.com/pricing/details/load-balancer/). AKS will **not** automatically provision a public IP address for the SLB frontend. AKS will **not** automatically configure the load balancer backend pool.
81
80
82
81
## Deploy a cluster with outbound type of UDR and Azure Firewall
83
82
@@ -96,7 +95,7 @@ To illustrate the application of a cluster with outbound type using a user-defin
96
95
97
96
### Set configuration via environment variables
98
97
99
-
To begin, define a set of environment variables to be used in resource creations.
98
+
Define a set of environment variables to be used in resource creations.
To begin we will provision a virtual network with three separate subnets, one for the cluster, one for the firewall, and one for service ingress.
139
+
Provision a virtual network with three separate subnets, one for the cluster, one for the firewall, and one for service ingress. This provides the initial subnet organization required by the scenario.
az network route-table route create -g $RG --name $FWROUTE_NAME_INTERNET --route-table-name $FWROUTE_TABLE_NAME --address-prefix $FWPUBLIC_IP/32 --next-hop-type Internet
237
236
```
238
237
239
-
See [virtual network and route table documentation](https://docs.microsoft.com/azure/virtual-network/virtual-networks-udr-overview#user-defined) about how you can override Azure's default system routes or add additional routes to a subnet's route table.
238
+
See [virtual network route table documentation](../virtual-network/virtual-networks-udr-overview.md#user-defined) about how you can override Azure's default system routes or add additional routes to a subnet's route table.
0 commit comments