Skip to content

Commit dc3a723

Browse files
committed
Update
1 parent 3974798 commit dc3a723

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

AKS-Hybrid/aks-hci-ip-address-planning.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: IP address planning for AKS
3-
description: Learn about how to plan for IP addresses and reservation, to deploy AKS in production.
2+
title: IP address planning for AKS enabled by Azure Arc
3+
description: Learn about how to plan for IP addresses and reservation, to deploy AKS Arc in production.
44
ms.topic: conceptual
55
ms.date: 10/08/2024
66
author: sethmanheim
@@ -9,11 +9,11 @@ ms.reviewer: abha
99
ms.lastreviewed: 10/08/2024
1010
---
1111

12-
# AKS enabled by Azure Arc IP address planning requirements
12+
# IP address planning requirements
1313

1414
[!INCLUDE [hci-applies-to-23h2](includes/hci-applies-to-23h2.md)]
1515

16-
IP address planning for AKS involves designing a network that supports applications, node pools, pod networks, service communication, and external access. This article walks you through some key considerations for effective IP address planning, and minimum number of IP addresses required to deploy AKS in production. See the [AKS networking concepts and requirements](aks-hci-network-system-requirements.md) before reading this article.
16+
IP address planning for AKS enabled by Azure Arc involves designing a network that supports applications, node pools, pod networks, service communication, and external access. This article walks you through some key considerations for effective IP address planning, and minimum number of IP addresses required to deploy AKS in production. See the [AKS networking concepts and requirements](aks-hci-network-system-requirements.md) before reading this article.
1717

1818

1919
## Simple IP address planning for Kubernetes clusters and applications
@@ -69,7 +69,6 @@ Sharing a logical network between AKS and Arc VMs on Azure Local offers the bene
6969
| **Security considerations** | Increased risk of cross-communication vulnerabilities if not properly segmented. | Better security as each network can be segmented and isolated more strictly. |
7070
| **Impact of network failures** | A failure in the shared network can affect both AKS and Arc VMs simultaneously. | A failure in one network affects only the workloads within that network, reducing overall risk. |
7171

72-
7372
## IP address range allocation for pod CIDR and service CIDR
7473

7574
### Pod network CIDR
@@ -81,6 +80,7 @@ AKS provides a **default value of 10.244.0.0/16** for the pod network CIDR. AKS
8180
### Service network CIDR
8281

8382
The Service network CIDR is the range of IP addresses reserved for Kubernetes services like LoadBalancers, ClusterIP, and NodePort within a cluster. Kubernetes supports the following service types:
83+
8484
- ClusterIP: The default service type, which exposes the service within the cluster. The IP assigned from the Service network CIDR is only accessible within the Kubernetes cluster.
8585
- NodePort: Exposes the service on a specific port on each node's IP address. The ClusterIP is still used internally, but external access is through the node IPs and a specific port.
8686
- LoadBalancer: This type creates a cloud-provider-managed load balancer and exposes the service externally. The cloud provider typically manages the external IP assignment, while the internal ClusterIP remains within the service network CIDR.

0 commit comments

Comments
 (0)