Skip to content

Commit 003698b

Browse files
authored
Merge pull request #206979 from MicrosoftDocs/main
8/04 PM Publish
2 parents 7c4dff8 + 51a48dc commit 003698b

File tree

126 files changed

+1692
-1517
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

126 files changed

+1692
-1517
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 22 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -301,14 +301,34 @@
301301
"redirect_url": "/azure/azure-monitor/alerts/alerts-types",
302302
"redirect_document_id": false
303303
},
304+
{
305+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-page.md" ,
306+
"redirect_url": "/azure/azure-monitor/alerts/alerts-manage-alert-instances",
307+
"redirect_document_id": false
308+
},
304309
{
305310
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-managing-alert-instances.md" ,
306-
"redirect_url": "/azure/azure-monitor/alerts/alerts-page",
311+
"redirect_url": "/azure/azure-monitor/alerts/alerts-manage-alert-instances",
307312
"redirect_document_id": false
308313
},
309314
{
310315
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-managing-alert-states.md" ,
311-
"redirect_url": "/azure/azure-monitor/alerts/alerts-page",
316+
"redirect_url": "/azure/azure-monitor/alerts/alerts-manage-alert-instances",
317+
"redirect_document_id": false
318+
},
319+
{
320+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-metric.md" ,
321+
"redirect_url": "/azure/azure-monitor/alerts/alerts-create-new-alert-rule",
322+
"redirect_document_id": false
323+
},
324+
{
325+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-log.md" ,
326+
"redirect_url": "/azure/azure-monitor/alerts/alerts-create-new-alert-rule",
327+
"redirect_document_id": false
328+
},
329+
{
330+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-activity-log.md" ,
331+
"redirect_url": "/azure/azure-monitor/alerts/alerts-create-new-alert-rule",
312332
"redirect_document_id": false
313333
},
314334
{

articles/aks/openfaas.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ gateway ClusterIP 10.0.156.194 <none> 8080/TCP
105105
gateway-external LoadBalancer 10.0.28.18 52.186.64.52 8080:30800/TCP 7m
106106
```
107107

108-
To test the OpenFaaS system, browse to the external IP address on port 8080, `http://52.186.64.52:8080` in this example. You will be prompted to log in. To fetch your password, enter `echo $PASSWORD`.
108+
To test the OpenFaaS system, browse to the external IP address on port 8080, `http://52.186.64.52:8080` in this example. You will be prompted to log in. The default user is `admin` and your password can be retrieved by using `echo $PASSWORD`.
109109

110110
![OpenFaaS UI](media/container-service-serverless/openfaas.png)
111111

articles/application-gateway/configure-alerts-with-templates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ You can use ARM templates to quickly configure important alerts for Application
2828
> 1. Use the Resource Group Name, Action Group Name and Subscription Info here to form the ResourceID for the action group as shown here: <br>
2929
> `/subscriptions/<subscription-id-from-your-account>/resourcegroups/<resource-group-name>/providers/microsoft.insights/actiongroups/<action-group-name>`
3030
- The templates for alerts described here are defined generically for settings like Severity, Aggregation Granularity, Frequency of Evaluation, Condition Type, and so on. You can modify the settings after deployment to meet your needs. See [Understand how metric alerts work in Azure Monitor](../azure-monitor/alerts/alerts-metric-overview.md) for more information.
31-
- The templates for metric-based alerts use the **Dynamic threshold** value with [High sensitivity](../azure-monitor/alerts/alerts-dynamic-thresholds.md#what-does-sensitivity-setting-in-dynamic-thresholds-mean). You can choose to adjust these settings based on your needs.
31+
- The templates for metric-based alerts use the **Dynamic threshold** value with [High sensitivity](../azure-monitor/alerts/alerts-dynamic-thresholds.md#what-does-the-sensitivity-setting-in-dynamic-thresholds-mean). You can choose to adjust these settings based on your needs.
3232

3333
## ARM templates
3434

articles/azure-arc/kubernetes/agent-upgrade.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ keywords: "Kubernetes, Arc, Azure, K8s, containers, agent, update, auto upgrade"
1010

1111
# Upgrade Azure Arc-enabled Kubernetes agents
1212

13-
Azure Arc-enabled Kubernetes provides both automatic and manual upgrade capabilities for its agents. If you disable automatic upgrade and instead rely on manual upgrade, a [version support policy](#version-support-policy) applies for Arc agents and the underlying Kubernetes clusters.
13+
Azure Arc-enabled Kubernetes provides both automatic and manual upgrade capabilities for its [agents](conceptual-agent-overview.md). If you disable automatic upgrade and instead rely on manual upgrade, a [version support policy](#version-support-policy) applies for Arc agents and the underlying Kubernetes clusters.
1414

1515
## Toggle automatic upgrade on or off when connecting cluster to Azure Arc
1616

articles/azure-arc/kubernetes/conceptual-agent-overview.md

Lines changed: 19 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -2,52 +2,55 @@
22
title: "Azure Arc-enabled Kubernetes agent architecture"
33
services: azure-arc
44
ms.service: azure-arc
5-
ms.date: 03/03/2021
5+
ms.date: 08/03/2021
66
ms.topic: conceptual
7-
description: "This article provides an architectural overview of Azure Arc-enabled Kubernetes agents"
7+
description: "This article provides an architectural overview of Azure Arc-enabled Kubernetes agents."
88
keywords: "Kubernetes, Arc, Azure, containers"
99
---
1010

1111
# Azure Arc-enabled Kubernetes agent overview
1212

13-
[Kubernetes](https://kubernetes.io/) can deploy containerized workloads consistently on hybrid and multi-cloud environments. Azure Arc-enabled Kubernetes provides a centralized, consistent control plane to manage policy, governance, and security across Kubernetes clusters on these heterogenous environments. This article provides an overview of the Azure Arc agents deployed on the Kubernetes clusters as part of connecting the cluster to Azure Arc.
13+
[Kubernetes](https://kubernetes.io/) can deploy containerized workloads consistently on hybrid and multi-cloud environments. [Azure Arc-enabled Kubernetes](overview.md) provides a centralized, consistent control plane to manage policy, governance, and security across Kubernetes clusters on these heterogenous environments.
14+
15+
This article provides an overview of the Azure Arc agents deployed on the Kubernetes clusters when [connecting them to Azure Arc](quickstart-connect-cluster.md).
1416

1517
## Deploy agents to your cluster
1618

17-
Most on-prem datacenters enforce strict network rules that prevent inbound communication on the network boundary firewall. Azure Arc-enabled Kubernetes works with these restrictions by not requiring inbound ports on the firewall. Azure Arc agents only require outbound communication to a prerequisite list of network endpoints.
19+
Most on-premises datacenters enforce strict network rules that prevent inbound communication on the network boundary firewall. Azure Arc-enabled Kubernetes works with these restrictions by not requiring inbound ports on the firewall. Azure Arc agents only require outbound communication to a [set list of network endpoints](quickstart-connect-cluster.md#meet-network-requirements).
1820

19-
[ ![Architectural overview](./media/architectural-overview.png) ](./media/architectural-overview.png#lightbox)
21+
![Diagram showing an architectural overview of the Azure Arc-enabled Kubernetes agents](./media/architectural-overview.png) ](./media/architectural-overview.png#lightbox)
2022

21-
The following steps are involved in connecting a Kubernetes cluster to Azure Arc:
23+
The following high-level steps are involved in [connecting a Kubernetes cluster to Azure Ar](quickstart-connect-cluster.md)c:
2224

2325
1. Create a Kubernetes cluster on your choice of infrastructure (VMware vSphere, Amazon Web Services, Google Cloud Platform, etc.).
2426

2527
> [!NOTE]
26-
> Since Azure Arc-enabled Kubernetes currently only supports attaching existing Kubernetes clusters to Azure Arc, customers are required to create and manage the lifecycle of the Kubernetes cluster themselves.
28+
> Azure Arc-enabled Kubernetes currently only supports attaching existing Kubernetes clusters to Azure Arc. You must create the cluster before you connect it to Azure Arc.
2729
28-
1. Start the Azure Arc registration for your cluster using Azure CLI.
29-
* Azure CLI uses Helm to deploy the agent Helm chart on the cluster.
30-
* The cluster nodes initiate an outbound communication to the [Microsoft Container Registry](https://github.com/microsoft/containerregistry) and pull the images needed to create the following agents in the `azure-arc` namespace:
30+
1. Start the Azure Arc registration for your cluster.
31+
* The agent Helm chart is deployed on the cluster.
32+
* The cluster nodes initiate an outbound communication to the [Microsoft Container Registry](https://github.com/microsoft/containerregistry), pulling the images needed to create the following agents in the `azure-arc` namespace:
3133

3234
| Agent | Description |
3335
| ----- | ----------- |
3436
| `deployment.apps/clusteridentityoperator` | Azure Arc-enabled Kubernetes currently supports only [system assigned identities](../../active-directory/managed-identities-azure-resources/overview.md). `clusteridentityoperator` initiates the first outbound communication. This first communication fetches the Managed Service Identity (MSI) certificate used by other agents for communication with Azure. |
3537
| `deployment.apps/config-agent` | Watches the connected cluster for source control configuration resources applied on the cluster. Updates the compliance state. |
36-
| `deployment.apps/controller-manager` | An operator of operators that orchestrates interactions between Azure Arc components. |
38+
| `deployment.apps/controller-manager` | An operator of operators that orchestrates interactions between Azure Arc components. |
3739
| `deployment.apps/metrics-agent` | Collects metrics of other Arc agents to verify optimal performance. |
3840
| `deployment.apps/cluster-metadata-operator` | Gathers cluster metadata, including cluster version, node count, and Azure Arc agent version. |
3941
| `deployment.apps/resource-sync-agent` | Syncs the above-mentioned cluster metadata to Azure. |
4042
| `deployment.apps/flux-logs-agent` | Collects logs from the flux operators deployed as a part of source control configuration. |
4143
| `deployment.apps/extension-manager` | Installs and manages lifecycle of extension helm charts |
42-
| `deployment.apps/kube-aad-proxy` | Used for authentication of requests sent to the cluster using Cluster Connect |
43-
| `deployment.apps/clusterconnect-agent` | Reverse proxy agent that enables Cluster Connect feature to provide access to `apiserver` of cluster. Optional component deployed only if `cluster-connect` feature is enabled on the cluster |
44-
| `deployment.apps/guard` | Authentication and authorization webhook server used for Azure Active Directory (Azure AD) RBAC. Optional component deployed only if `azure-rbac` feature is enabled on the cluster |
44+
| `deployment.apps/kube-aad-proxy` | Used for authentication of requests sent to the cluster using Cluster Connect. |
45+
| `deployment.apps/clusterconnect-agent` | Reverse proxy agent that enables the Cluster Connect feature to provide access to `apiserver` of the cluster. Optional component deployed only if the [Cluster Connect](conceptual-cluster-connect.md) feature is enabled. |
46+
| `deployment.apps/guard` | Authentication and authorization webhook server used for Azure Active Directory (Azure AD) RBAC. Optional component deployed only if [Azure RBAC](conceptual-azure-rbac.md) is enabled on the cluster. |
4547

46-
1. Once all the Azure Arc-enabled Kubernetes agent pods are in `Running` state, verify that your cluster connected to Azure Arc. You should see:
48+
1. Once all the Azure Arc-enabled Kubernetes agent pods are in `Running` state, verify that your cluster is connected to Azure Arc. You should see:
4749
* An Azure Arc-enabled Kubernetes resource in [Azure Resource Manager](../../azure-resource-manager/management/overview.md). Azure tracks this resource as a projection of the customer-managed Kubernetes cluster, not the actual Kubernetes cluster itself.
48-
* Cluster metadata (like Kubernetes version, agent version, and number of nodes) appears on the Azure Arc-enabled Kubernetes resource as metadata.
50+
* Cluster metadata (such as Kubernetes version, agent version, and number of nodes) appearing on the Azure Arc-enabled Kubernetes resource as metadata.
4951

5052
## Next steps
5153

5254
* Walk through our quickstart to [connect a Kubernetes cluster to Azure Arc](./quickstart-connect-cluster.md).
55+
* Learn about [upgrading Azure Arc-enabled Kubernetes agents](agent-upgrade.md).
5356
* Learn more about the creating connections between your cluster and a Git repository as a [configuration resource with Azure Arc-enabled Kubernetes](./conceptual-configurations.md).

0 commit comments

Comments
 (0)