Skip to content

Commit 0450c50

Browse files
Merge pull request #234956 from schaffererin/azrback8sauthlinkfix
Fixing broken link
2 parents 0d3f311 + 689cfbb commit 0450c50

File tree

2 files changed

+7
-10
lines changed

2 files changed

+7
-10
lines changed

articles/aks/manage-azure-rbac.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ author: palma21
1414

1515
When you leverage [integrated authentication between Azure Active Directory (Azure AD) and AKS](managed-aad.md), you can use Azure AD users, groups, or service principals as subjects in [Kubernetes role-based access control (Kubernetes RBAC)][kubernetes-rbac]. This feature frees you from having to separately manage user identities and credentials for Kubernetes. However, you still have to set up and manage Azure RBAC and Kubernetes RBAC separately.
1616

17-
This article covers how to use Azure RBAC for Kubernetes Authorization, which allows for the unified management and access control across Azure resources, AKS, and Kubernetes resources. For more information, see [Azure RBAC for Kubernetes Authorization][azure-rbac-kubernetes-rbac].
17+
This article covers how to use Azure RBAC for Kubernetes Authorization, which allows for the unified management and access control across Azure resources, AKS, and Kubernetes resources. For more information, see [Azure RBAC for Kubernetes Authorization][kubernetes-rbac].
1818

1919
## Before you begin
2020

@@ -206,7 +206,7 @@ az group delete -n myResourceGroup
206206

207207
To learn more about AKS authentication, authorization, Kubernetes RBAC, and Azure RBAC, see:
208208

209-
* [Access and identity options for AKS](/concepts-identity.md)
209+
* [Access and identity options for AKS](./concepts-identity.md)
210210
* [What is Azure RBAC?](../role-based-access-control/overview.md)
211211
* [Microsoft.ContainerService operations](../role-based-access-control/resource-provider-operations.md#microsoftcontainerservice)
212212

@@ -228,5 +228,4 @@ To learn more about AKS authentication, authorization, Kubernetes RBAC, and Azur
228228
[install-azure-cli]: /cli/azure/install-azure-cli
229229
[az-role-definition-create]: /cli/azure/role/definition#az_role_definition_create
230230
[az-aks-get-credentials]: /cli/azure/aks#az_aks_get-credentials
231-
[kubernetes-rbac]: /concepts-identity#azure-rbac-for-kubernetes-authorization
232-
[azure-rbac-kubernetes-rbac]: /concepts-identity#azure-rbac-for-kubernetes-authorization
231+
[kubernetes-rbac]: ./concepts-identity.md#azure-rbac-for-kubernetes-authorization

articles/aks/supported-kubernetes-versions.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -57,11 +57,11 @@ For the past release history, see [Kubernetes history](https://en.wikipedia.org/
5757
> [!NOTE]
5858
> Alias minor version requires Azure CLI version 2.37 or above as well as API version 20220201 or above. Use `az upgrade` to install the latest version of the CLI.
5959
60-
With AKS, you can create a cluster without specifying the exact patch version. When you create a cluster without designating a patch, the cluster will run the minor version's latest GA patch. For example, if you create a cluster with **`1.21`**, your cluster will run **`1.21.7`**, which is the latest GA patch version of *1.21*.
60+
AKS allows you to create a cluster without specifying the exact patch version. When you create a cluster without designating a patch, the cluster runs the minor version's latest GA patch. For example, if you create a cluster with **`1.21`**, your cluster will run **`1.21.7`**, which is the latest GA patch version of *1.21*.
6161

62-
When you upgrade by alias minor version, only a higher minor version is supported. For example, upgrading from `1.14.x` to `1.14` won't trigger an upgrade to the latest GA `1.14` patch, but upgrading to `1.15` will trigger an upgrade to the latest GA `1.15` patch. If you wish to upgrade your patch version in the same minor version, please use [auto-upgrade](./auto-upgrade-cluster.md#using-cluster-auto-upgrade).
62+
When you upgrade by alias minor version, only a higher minor version is supported. For example, upgrading from `1.14.x` to `1.14` doesn't trigger an upgrade to the latest GA `1.14` patch, but upgrading to `1.15` triggers an upgrade to the latest GA `1.15` patch.
6363

64-
To see what patch you're on, run the `az aks show --resource-group myResourceGroup --name myAKSCluster` command. The `currentKubernetesVersion` property shows the whole Kubernetes version.
64+
To see what patch you're on, run the `az aks show --resource-group myResourceGroup --name myAKSCluster` command. The property `currentKubernetesVersion` shows the whole Kubernetes version.
6565

6666
```
6767
{
@@ -96,9 +96,7 @@ New minor version | Supported Version List
9696
----------------- | ----------------------
9797
1.17.a | 1.17.a, 1.17.b, 1.16.c, 1.16.d, 1.15.e, 1.15.f
9898

99-
Where ".letter" is representative of patch versions.
100-
101-
When a new minor version is introduced, the oldest minor version and patch releases supported are deprecated and removed. For example, if the current supported version list is:
99+
When a new minor version is introduced, the oldest supported minor version and patch releases are deprecated and removed. For example, the current supported version list is:
102100

103101
```
104102
1.17.a

0 commit comments

Comments
 (0)