Skip to content

Commit cf73306

Browse files
Merge pull request #314815 from aimee-littleton/patch-769023
Update limitations for StandardV2 NAT Gateway
2 parents ecff0c2 + 6b11c40 commit cf73306

5 files changed

Lines changed: 1 addition & 19 deletions

File tree

articles/nat-gateway/faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -275,7 +275,7 @@ sections:
275275
276276
- question: Can I use a NAT gateway with Azure Kubernetes Service?
277277
answer: |
278-
Yes. StandardV2 and Standard NAT Gateway can be deployed with either a Managed NAT Gateway or user-assigned NAT Gateway. StandardV2 NAT Gateway can only be used as a user-assigned NAT Gateway. For more information about NAT gateway integration with Azure Kubernetes Service, see [Managed NAT Gateway](/azure/aks/nat-gateway).
278+
Yes. StandardV2 and Standard NAT Gateway can be deployed with either a Managed NAT Gateway or user-assigned NAT Gateway. For more information about NAT gateway integration with Azure Kubernetes Service, see [Managed NAT Gateway](/azure/aks/nat-gateway).
279279
280280
- question: When is NAT gateway used to connect from my AKS cluster to the AKS API server?
281281
answer: |

articles/nat-gateway/nat-gateway-v2-migrate.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -35,20 +35,16 @@ We recommend the following pre-migration steps to prepare for the migration.
3535
Before you migrate to StandardV2 NAT gateway, make sure that your specific scenario is supported. Review the following unsupported scenarios and [known issues](#known-issues) with StandardV2 NAT gateway.
3636

3737
* StandardV2 NAT Gateway must be used with StandardV2 SKU public IPs. Standard SKU public IPs aren't supported.
38-
* Azure Kubernetes Service (AKS) managed NAT gateway doesn't support StandardV2 NAT Gateway deployment. To use a StandardV2 NAT gateway with AKS, StandardV2 NAT Gateway must be deployed as user-assigned.
3938
* StandardV2 NAT Gateway and Basic SKU Load balancer or Basic SKU public IPs aren't supported.
4039
* StandardV2 NAT Gateway doesn't support the use of custom public IPs (BYOIP).
4140
* The following regions don't support StandardV2 NAT Gateway and StandardV2 public IPs:
42-
* Brazil Southeast
4341
* Canada East
44-
* Central India
4542
* Chile Central
4643
* Indonesia Central
4744
* Israel Northwest
4845
* Malaysia West
4946
* Qatar Central
5047
* Sweden South
51-
* UAE Central
5248
* West Central US
5349
* West India
5450

articles/nat-gateway/nat-overview.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -48,19 +48,15 @@ To learn more about how to deploy StandardV2 NAT Gateway, see [Create a Standard
4848
* Requires StandardV2 SKU public IP addresses or prefixes. Standard SKU public IPs aren't supported with StandardV2 NAT Gateway.
4949
* Standard SKU NAT Gateway can't be upgraded to StandardV2 NAT Gateway. You must first create StandardV2 SKU NAT Gateway and replace Standard SKU NAT Gateway on your subnet.
5050
* The following regions don't support StandardV2 NAT Gateway:
51-
* Brazil Southeast
5251
* Canada East
53-
* Central India
5452
* Chile Central
5553
* Indonesia Central
5654
* Israel Northwest
5755
* Malaysia West
5856
* Qatar Central
5957
* Sweden South
60-
* UAE Central
6158
* West Central US
6259
* West India
63-
* Terraform doesn't yet support StandardV2 NAT Gateway and StandardV2 Public IP deployments.
6460
* StandardV2 NAT Gateway doesn't support and can't be attached to delegated subnets for the following services:
6561
* Azure SQL Managed Instance
6662
* Azure Container Instances

articles/nat-gateway/nat-sku.md

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -69,12 +69,9 @@ StandardV2 NAT Gateway supports flow logs through Azure Monitor. Flow logs provi
6969
* Custom IP prefixes (BYOIP public IPs) aren't supported with StandardV2 NAT Gateway. Only StandardV2 SKU Azure public IPs are supported.
7070

7171
* The following regions don't support StandardV2 NAT Gateway:
72-
* Brazil Southeast
7372

7473
* Canada East
7574

76-
* Central India
77-
7875
* Chile Central
7976

8077
* Indonesia Central
@@ -86,17 +83,13 @@ StandardV2 NAT Gateway supports flow logs through Azure Monitor. Flow logs provi
8683
* Qatar Central
8784

8885
* Sweden South
89-
90-
* UAE Central
9186

9287
* West Central US
9388

9489
* West India
9590

9691
* StandardV2 NAT Gateway can’t be deployed as a managed NAT Gateway for Azure Kubernetes Service (AKS) workloads. It's only supported when configured as a user-assigned NAT Gateway. For more information, see [Create NAT Gateway for your AKS cluster](/azure/aks/nat-gateway).
9792

98-
* Terraform doesn't yet support StandardV2 NAT Gateway and StandardV2 Public IP deployments.
99-
10093
* StandardV2 NAT Gateway doesn't support and can't be attached to delegated subnets for the following services:
10194
* Azure SQL Managed Instance
10295
* Azure Container Instances

articles/nat-gateway/quickstart-create-nat-gateway-v2.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,6 @@ ms.custom: template-quickstart, FY23 content-maintenance, linux-related-content
1515

1616
In this quickstart, learn how to create a Standard V2 Azure NAT Gateway by using the Azure portal, and PowerShell. The NAT Gateway service provides scalable outbound connectivity for virtual machines in Azure.
1717

18-
> [!NOTE]
19-
> Terraform is currently unavailable. Use the Azure portal, CLI, or Azure PowerShell to create a Standard V2 NAT Gateway.
20-
2118
## Prerequisites
2219

2320
### [Portal](#tab/portal)

0 commit comments

Comments
 (0)