Skip to content

Commit 6e0d6e9

Browse files
author
Simonx Xu
authored
Merge pull request #7928 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/SupportArticles-docs (branch main)
2 parents 93f092a + a8142a6 commit 6e0d6e9

1 file changed

Lines changed: 3 additions & 4 deletions

File tree

support/azure/azure-kubernetes/create-upgrade-delete/error-code-outboundconnfailvmextensionerror.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Troubleshoot the OutboundConnFailVMExtensionError error code (50)
33
description: Learn how to troubleshoot the OutboundConnFailVMExtensionError error (50) when you try to start or create and deploy an Azure Kubernetes Service (AKS) cluster.
4-
ms.date: 01/24/2024
5-
ms.reviewer: rissing, chiragpa, v-leedennis, jovieir
4+
ms.date: 12/23/2024
5+
ms.reviewer: rissing, chiragpa, jaewonpark, v-leedennis, jovieir, v-weizhu
66
ms.service: azure-kubernetes-service
77
ms.custom: sap:Create, Upgrade, Scale and Delete operations (cluster or nodepool)
88
---
@@ -114,8 +114,7 @@ There are many reasons why the traffic might be blocked. In any of these situati
114114
The following table lists specific reasons why traffic might be blocked, and the corresponding solution for each reason.
115115
| Issue | Solution |
116116
| ----- | -------- |
117-
| Traffic is blocked by firewall rules or a proxy server | In this scenario, a firewall or a proxy server does egress filtering. To verify that all required domains and ports are allowed, see [Control egress traffic for cluster nodes in Azure Kubernetes Service (AKS)](/azure/aks/limit-egress-traffic). |
118-
| Traffic is blocked by a cluster network security group (NSG) | On any NSGs that are attached to your cluster, verify that there's no blocking on port 443, port 53, or any other port that might have to be used to connect to the endpoint. For more information, see [Control egress traffic for cluster nodes in Azure Kubernetes Service (AKS)](/azure/aks/limit-egress-traffic). |
117+
| Traffic is blocked by firewall rules, a proxy server or Network Security Group (NSG) | This issue occurs when the AKS required ports or Fully Qualified Domain Names (FQDNs) are blocked by a firewall, proxy server, or NSG. Ensure these ports and FQDNs are allowed. To determine what's blocked, check the connectivity provided in the preceeding [Cause](#cause) section. For more information about AKS required ports and FQDNs, see [Outbound network and FQDN rules for Azure Kubernetes Service (AKS) clusters](/azure/aks/outbound-rules-control-egress).|
119118
| The AAAA (IPv6) record is blocked on the firewall | On your firewall, verify that nothing exists that would block the endpoint from resolving in Azure DNS. |
120119
| Private cluster can't resolve internal Azure resources | In private clusters, the Azure DNS IP address (`168.63.129.16`) must be added as an upstream DNS server if custom DNS is used. Verify that the address is set on your DNS servers. For more information, see [Create a private AKS cluster](/azure/aks/private-clusters) and [What is IP address 168.63.129.16?](/azure/virtual-network/what-is-ip-address-168-63-129-16) |
121120

0 commit comments

Comments
 (0)