Skip to content

Commit 0e409cf

Browse files
authored
Update cannot-access-cluster-api-server-using-authorized-ip-ranges.md
Content changes for 'Can't access the cluster API server when using authorized IP ranges' as part of doc refresh review on 03/20/2025 - Changed the contents to clarify the issue and added an error message.
1 parent 94826bc commit 0e409cf

1 file changed

Lines changed: 6 additions & 2 deletions

File tree

support/azure/azure-kubernetes/connectivity/cannot-access-cluster-api-server-using-authorized-ip-ranges.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Can't access the cluster API server using authorized IP ranges
33
description: Troubleshoot problems accessing the cluster API server when you use authorized IP address ranges in Azure Kubernetes Service (AKS).
4-
ms.date: 11/18/2024
4+
ms.date: 03/20/2024
55
ms.reviewer: chiragpa, nickoman, v-leedennis
66
ms.service: azure-kubernetes-service
77
keywords:
@@ -14,7 +14,11 @@ This article discusses how to resolve a scenario in which you can't use authoriz
1414

1515
## Symptoms
1616

17-
If you try to create or manage an AKS cluster, you can't access the cluster API server.
17+
If you try to create or manage resources in an AKS cluster, you can't access the cluster API server.
18+
When you run `kubectl`, you receive the following error message:
19+
```
20+
Unable to connect to the server: dial tcp x.x.x.x:443: i/o timeout
21+
```
1822

1923
## Cause
2024

0 commit comments

Comments
 (0)