Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit c0130a2

Browse files
committedFeb 25, 2022
PR with publishing-suggested changes
1 parent 054c2ae commit c0130a2

File tree

2 files changed

+5
-4
lines changed

2 files changed

+5
-4
lines changed
 

‎articles/openshift/concepts-egress-lockdown.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Overview of egress lockdown
2+
title:Overview of egress lockdown for Azure Red Hat OpenShift clusters
33
description: Overview of egress lockdown for Azure Red Hat OpenShift clusters
44
author: rahulm23
55
ms.author: rahulmehta
@@ -10,7 +10,7 @@ ms.date: 02/28/2022
1010
#Customer intent: I need to understand how egress lockdown provides access to URLs and endpoints that a Red Hat OpenShift cluster needs to function efficiently.
1111
---
1212

13-
# Overview of egress lockdown
13+
# Overview of egress lockdown for Azure Red Hat OpenShift clusters
1414

1515
Egress lockdown provides access to the URLs and endpoints an Azure Red Hat OpenShift cluster needs to function effectively.
1616

@@ -22,15 +22,16 @@ Egress lockdown doesn't rely on customer internet access for Azure Red Hat OpenS
2222

2323
The following image displays the architecture changes that encompass egress lockdown.
2424

25-
![Azure Red Hat OpenShift architectural diagram with egress lockdown components](./media/concepts-networking/190_OpenShift_Azuer_network_arch_0921.png)
25+
26+
[ ![Diagram of architecture for Azure Red Hat OpenShift egress lockdown components.](./media/concepts-networking/190-azure-red-hat-openshift-network-architecture-0921)](./media/concepts-networking/190-azure-red-hat-openshift-network-architecture-0921#lightbox)
2627

2728
A well-known subset of domains (that the Azure Red Hat OpenShift clusters need to function) validates the destination of the cluster traffic. Finally, the traffic passes through the Azure Red Hat OpenShift service to connect to these URLs and endpoints.
2829

2930
## Enable egress lockdown
3031

3132
In order to function, egress lock down relies on the Server Name Indication (SNI) extension to the Transport Layer Security (TLS). All customer workloads that communicate with the well-known subset of domains must have SNI enabled.
3233

33-
Egress lockdown is enabled by default for new cluster creation. However, to enable egress lockdown on existing clusters, you must have SNI enabled on the customer workloads. To enable egress lockdown on your existing clusters, submit a support case to either [Microsoft Support](https://support.microsoft.com/en-us) or [Red Hat Support](https://www.redhat.com/en/services/support).
34+
Egress lockdown is enabled by default for new cluster creation. However, to enable egress lockdown on existing clusters, you must have SNI enabled on the customer workloads. To enable egress lockdown on your existing clusters, submit a support case to either [Microsoft Support](https://support.microsoft.com) or [Red Hat Support](https://www.redhat.com/en/services/support).
3435

3536
## Verify egress lockdown is enabled on a cluster
3637

0 commit comments

Comments
 (0)
Please sign in to comment.