You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/azure/azure-kubernetes/connectivity/basic-troubleshooting-outbound-connections.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -132,17 +132,19 @@ For basic troubleshooting for egress traffic from an AKS cluster, follow these s
132
132
133
133
#### Check if Azure network resources are blocking traffic to the endpoint
134
134
135
-
To determine if traffic is blocked to the endpoint due to Azure network resources, run a connectivity analysis from your AKS cluster nodes to the endpoint using the Azure Virtual Network Verifier (Preview) tool. The connectivity analysis covers the following resources:
135
+
To determine if traffic is blocked to the endpoint due to Azure network resources, run a connectivity analysis from your AKS cluster nodes to the endpoint using the [Azure Virtual Network Verifier (Preview)](/azure/virtual-network-manager/concept-virtual-network-verifier#supported-features-of-the-reachability-analysis) tool. The connectivity analysis covers the following resources:
136
136
137
137
- Azure Load Balancer
138
138
- Azure Firewall
139
139
- A network address translation (NAT) gateway
140
140
- Network security group (NSG)
141
141
- Network policy
142
+
- User defined routes (route tables)
143
+
- Virtual network peering
142
144
143
145
> [!NOTE]
144
146
>
145
-
> Azure Virtual Network Verifier (Preview) doesn't look at any external or third-party networking resources, such as a custom firewall. If the connectivity analysis doesn't detect any blocked traffic, we recommend that you perform a manual check of any external networking to cover all hops in the traffic flow.
147
+
> Azure Virtual Network Verifier (Preview) can't access any external or third-party networking resources, such as a custom firewall. If the connectivity analysis doesn't detect any blocked traffic, we recommend that you perform a manual check of any external networking to cover all hops in the traffic flow.
146
148
>
147
149
> Currently, clusters using Azure CNI Overlay aren't supported for this feature. Support for CNI Overlay is planned for August 2025.
Copy file name to clipboardExpand all lines: support/azure/azure-kubernetes/create-upgrade-delete/error-code-outboundconnfailvmextensionerror.md
+10-7Lines changed: 10 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,26 +42,29 @@ There are many reasons why the outbound traffic might be blocked. The best way t
42
42
43
43
### Check if Azure network resources are blocking traffic to the endpoint
44
44
45
-
To determine if traffic is blocked to the endpoint due to Azure network resources, run a connectivity analysis from your AKS cluster nodes to the endpoint using the [Azure Virtual Network Verifier (Preview)](/azure/virtual-network-manager/concept-virtual-network-verifier) tool. The connectivity analysis covers the following resources:
45
+
To determine if traffic is blocked to the endpoint due to Azure network resources, run a connectivity analysis from your AKS cluster nodes to the endpoint using the [Azure Virtual Network Verifier (Preview)](/azure/virtual-network-manager/concept-virtual-network-verifier#supported-features-of-the-reachability-analysis) tool. The connectivity analysis covers the following resources:
46
46
47
47
- Azure Load Balancer
48
48
- Azure Firewall
49
49
- A network address translation (NAT) gateway
50
50
- Network security group (NSG)
51
51
- Network policy
52
+
- User defined routes (route tables)
53
+
- Virtual network peering
52
54
53
55
> [!NOTE]
54
56
>
55
-
> Azure Virtual Network Verifier (Preview) doesn't look at any external or third-party networking resources, such as a custom firewall. After running the connectivity analysis, we recommend that you perform a manual check of any external networking to cover all hops in the traffic flow.
57
+
> Azure Virtual Network Verifier (Preview) can't access any external or third-party networking resources, such as a custom firewall. If the connectivity analysis doesn't detect any blocked traffic, we recommend that you perform a manual check of any external networking to cover all hops in the traffic flow.
56
58
>
57
59
> Currently, clusters using Azure CNI Overlay aren't supported for this feature. Support for CNI Overlay is planned for August 2025.
58
60
59
61
1. Navigate to your cluster in the Azure portal. In the sidebar, navigate to the Settings -> Node pools blade.
60
-
1. Identify the nodepool you want to run a connectivity analysis from. Click on the nodepool to select it as the scope.
61
-
1. Click on the three dots "..." in the toolbar at the top of the page. In the expanded menu, select "Connectivity analysis (Preview)."<imgwidth="626"alt="image"src="https://github.com/user-attachments/assets/b2f05947-f753-49b9-9536-98d0b998ab52" />
62
-
1. Select a Virtual Machine Scale Set (VMSS) instance as the source. The source IP addresses are generated automatically.
63
-
1. Select a public domain name/endpoint as the destination for the analysis. The destination IP addresses are also generated automatically.
64
-
1. Run the analysis and wait up to 2 minutes for the results. In the resulting diagram, identify the associated Azure network resources and where traffic is blocked. Click on the icons to show the detailed analysis output.
62
+
2. Identify the nodepool you want to run a connectivity analysis from. Click on the nodepool to select it as the scope.
63
+
3. Select "Connectivity analysis (Preview)" from the toolbar at the top of the page. If you don't see it, click on the three dots "..." in the toolbar at the top of the page to open the expanded menu. <imgwidth="626"alt="image"src="https://github.com/user-attachments/assets/b2f05947-f753-49b9-9536-98d0b998ab52" />
64
+
4. Select a Virtual Machine Scale Set (VMSS) instance as the source. The source IP addresses are populated automatically.
65
+
5. Select a public domain name/endpoint as the destination for the analysis, one example is `mcr.microsoft.com`. The destination IP addresses are also populated automatically.
66
+
6. Run the analysis and wait up to 2 minutes for the results. In the resulting diagram, identify the associated Azure network resources and where traffic is blocked. To view the detailed analysis output, click on the "JSON output" tab or click into the arrows in the diagram.
0 commit comments