Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion articles/aks/azure-cni-overlay.md
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@ Like Azure CNI Overlay, Kubenet assigns IP addresses to pods from an address spa
- **Kubernetes DNS service IP address**: This IP address is within the Kubernetes service address range that's used by cluster service discovery. Don't use the first IP address in your address range, as this address is used for the `kubernetes.default.svc.cluster.local` address.

> [!IMPORTANT]
> The private CIDR ranges available for the Pod CIDR are defined in [RFC 1918](https://tools.ietf.org/html/rfc1918). While we don't block the use of public IP ranges, they are considered out of Microsoft's support scope. We recommend using private IP ranges for pod CIDR.
> The private CIDR ranges available for the Pod CIDR are defined in [RFC 1918](https://tools.ietf.org/html/rfc1918) and [RFC 6598](https://tools.ietf.org/html/rfc6598). While we don't block the use of public IP ranges, they are considered out of Microsoft's support scope. We recommend using private IP ranges for pod CIDR.
Copy link

Copilot AI Oct 16, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

RFC 6598 (100.64.0.0/10) defines Shared Address Space for carrier-grade NAT, not private address space like RFC 1918; labeling it as a 'private CIDR range' is inaccurate and may mislead users. Suggest rewording to: 'The address spaces suitable for Pod CIDR include the private ranges defined in RFC 1918 and, where appropriate, the shared address space (RFC 6598, 100.64.0.0/10). Note that RFC 6598 is reserved for carrier-grade NAT and its use may have operational implications.'

Suggested change
> The private CIDR ranges available for the Pod CIDR are defined in [RFC 1918](https://tools.ietf.org/html/rfc1918) and [RFC 6598](https://tools.ietf.org/html/rfc6598). While we don't block the use of public IP ranges, they are considered out of Microsoft's support scope. We recommend using private IP ranges for pod CIDR.
> The address spaces suitable for Pod CIDR include the private ranges defined in [RFC 1918](https://tools.ietf.org/html/rfc1918) and, where appropriate, the shared address space ([RFC 6598](https://tools.ietf.org/html/rfc6598), 100.64.0.0/10). Note that RFC 6598 is reserved for carrier-grade NAT and its use may have operational implications. While we don't block the use of public IP ranges, they are considered out of Microsoft's support scope. We recommend using private IP ranges for pod CIDR.

Copilot uses AI. Check for mistakes.

> [!IMPORTANT]
> When using Azure CNI in Overlay mode, ensure that the Pod CIDR does not overlap with any external IP addresses or networks (such as on-premises networks, peered VNets, or ExpressRoute). If an external host uses an IP within the Pod CIDR, packets destined for that host from the Pod may be redirected into the overlay network and SNAT’d by the node, causing the external endpoint to become unreachable.
Expand Down