Skip to content

Commit 8a021f5

Browse files
authored
Merge pull request MicrosoftDocs#36177 from larryms/patch-7
Update api-server-authorized-ip-ranges.md
2 parents cb83689 + c223ba1 commit 8a021f5

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/aks/api-server-authorized-ip-ranges.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -216,13 +216,13 @@ To enable API server authorized IP ranges, you provide a list of authorized IP a
216216

217217
Use [az aks update][az-aks-update] command and specify the *--api-server-authorized-ip-ranges* to allow. These IP address ranges are usually address ranges used by your on-premises networks. Add the public IP address of your own Azure firewall obtained in the previous step, such as *20.42.25.196/32*.
218218

219-
The following example enables API server authorized IP ranges on the cluster named *myAKSCluster* in the resource group named *myResourceGroup*. The IP address ranges to authorize are *20.42.25.196/32* (the Azure firewall public IP address), then *172.0.0.10/16* and *168.10.0.10/18*:
219+
The following example enables API server authorized IP ranges on the cluster named *myAKSCluster* in the resource group named *myResourceGroup*. The IP address ranges to authorize are *20.42.25.196/32* (the Azure firewall public IP address), then *172.0.0.0/16* and *168.10.0.0/18*:
220220

221221
```azurecli-interactive
222222
az aks update \
223223
--resource-group myResourceGroup \
224224
--name myAKSCluster \
225-
--api-server-authorized-ip-ranges 20.42.25.196/32,172.0.0.10/16,168.10.0.10/18
225+
--api-server-authorized-ip-ranges 20.42.25.196/32,172.0.0.0/16,168.10.0.0/18
226226
```
227227

228228
## Update or disable authorized IP ranges

0 commit comments

Comments
 (0)