Skip to content

Commit 107693f

Browse files
authored
Merge pull request #259642 from MicrosoftDocs/main
Publish to live, Tuesday 4 AM PST, 11/28
2 parents 8bbb986 + cf66ddd commit 107693f

19 files changed

+641
-166
lines changed

articles/aks/azure-blob-csi.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use Container Storage Interface (CSI) driver for Azure Blob storage on Az
33
description: Learn how to use the Container Storage Interface (CSI) driver for Azure Blob storage in an Azure Kubernetes Service (AKS) cluster.
44
ms.topic: article
55
ms.custom: devx-track-linux
6-
ms.date: 11/01/2023
6+
ms.date: 11/24/2023
77
---
88

99
# Use Azure Blob storage Container Storage Interface (CSI) driver
@@ -33,6 +33,8 @@ Azure Blob storage CSI driver supports the following features:
3333
- You need the Azure CLI version 2.42 or later installed and configured. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI][install-azure-cli].
3434

3535
- Perform the steps in this [link][csi-blob-storage-open-source-driver-uninstall-steps] if you previously installed the [CSI Blob Storage open-source driver][csi-blob-storage-open-source-driver] to access Azure Blob storage from your cluster.
36+
> [!NOTE]
37+
> If the blobfuse-proxy is not enabled during the installation of the open source driver, the uninstallation of the open source driver will disrupt existing blobfuse mounts. However, NFS mounts will remain unaffected.
3638
3739
## Enable CSI driver on a new or existing AKS cluster
3840

articles/aks/azure-csi-blob-storage-provision.md

Lines changed: 12 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ titleSuffix: Azure Kubernetes Service
44
description: Learn how to create a static or dynamic persistent volume with Azure Blob storage for use with multiple concurrent pods in Azure Kubernetes Service (AKS)
55
ms.topic: article
66
ms.custom: devx-track-linux
7-
ms.date: 09/06/2023
7+
ms.date: 11/28/2023
88
---
99

1010
# Create and use a volume with Azure Blob storage in Azure Kubernetes Service (AKS)
@@ -28,6 +28,7 @@ For more information on Kubernetes volumes, see [Storage options for application
2828

2929
- To create an ADLS account using the driver in dynamic provisioning, specify `isHnsEnabled: "true"` in the storage class parameters.
3030
- To enable blobfuse access to an ADLS account in static provisioning, specify the mount option `--use-adls=true` in the persistent volume.
31+
- If you are going to enable a storage account with Hierarchical Namespace, existing persistent volumes should be remounted with `--use-adls=true` mount option.
3132

3233
## Dynamically provision a volume
3334

@@ -72,12 +73,10 @@ A persistent volume claim (PVC) uses the storage class object to dynamically pro
7273
kind: PersistentVolumeClaim
7374
metadata:
7475
name: azure-blob-storage
75-
annotations:
76-
volume.beta.kubernetes.io/storage-class: azureblob-nfs-premium
7776
spec:
7877
accessModes:
7978
- ReadWriteMany
80-
storageClassName: my-blobstorage
79+
storageClassName: azureblob-nfs-premium
8180
resources:
8281
requests:
8382
storage: 5Gi
@@ -127,6 +126,7 @@ The following YAML creates a pod that uses the persistent volume claim **azure-b
127126
volumeMounts:
128127
- mountPath: "/mnt/blob"
129128
name: volume
129+
readOnly: false
130130
volumes:
131131
- name: volume
132132
persistentVolumeClaim:
@@ -177,6 +177,9 @@ In this example, the following manifest configures mounting a Blob storage conta
177177
protocol: nfs
178178
tags: environment=Development
179179
volumeBindingMode: Immediate
180+
allowVolumeExpansion: true
181+
mountOptions:
182+
- nconnect=4
180183
```
181184

182185
2. Create the storage class with the [kubectl apply][kubectl-apply] command:
@@ -318,12 +321,13 @@ The following example demonstrates how to mount a Blob storage container as a pe
318321
- ReadWriteMany
319322
persistentVolumeReclaimPolicy: Retain # If set as "Delete" container would be removed after pvc deletion
320323
storageClassName: azureblob-nfs-premium
324+
mountOptions:
325+
- nconnect=4
321326
csi:
322327
driver: blob.csi.azure.com
323-
readOnly: false
324328
# make sure volumeid is unique for every identical storage blob container in the cluster
325329
# character `#` and `/` are reserved for internal use and cannot be used in volumehandle
326-
volumeHandle: unique-volumeid
330+
volumeHandle: account-name_container-name
327331
volumeAttributes:
328332
resourceGroup: resourceGroupName
329333
storageAccount: storageAccountName
@@ -413,10 +417,9 @@ Kubernetes needs credentials to access the Blob storage container created earlie
413417
- --file-cache-timeout-in-seconds=120
414418
csi:
415419
driver: blob.csi.azure.com
416-
readOnly: false
417420
# volumeid has to be unique for every identical storage blob container in the cluster
418421
# character `#`and `/` are reserved for internal use and cannot be used in volumehandle
419-
volumeHandle: unique-volumeid
422+
volumeHandle: account-name_container-name
420423
volumeAttributes:
421424
containerName: containerName
422425
nodeStageSecretRef:
@@ -475,6 +478,7 @@ The following YAML creates a pod that uses the persistent volume or persistent v
475478
volumeMounts:
476479
- name: blob01
477480
mountPath: "/mnt/blob"
481+
readOnly: false
478482
volumes:
479483
- name: blob01
480484
persistentVolumeClaim:

articles/aks/azure-csi-disk-storage-provision.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ titleSuffix: Azure Kubernetes Service
44
description: Learn how to create a static or dynamic persistent volume with Azure Disks for use with multiple concurrent pods in Azure Kubernetes Service (AKS)
55
ms.topic: article
66
ms.custom: devx-track-azurecli, devx-track-linux
7-
ms.date: 04/11/2023
7+
ms.date: 11/28/2023
88
---
99

1010
# Create and use a volume with Azure Disks in Azure Kubernetes Service (AKS)
@@ -165,6 +165,7 @@ After you create the persistent volume claim, you must verify it has a status of
165165
volumeMounts:
166166
- mountPath: "/mnt/azure"
167167
name: volume
168+
readOnly: false
168169
volumes:
169170
- name: volume
170171
persistentVolumeClaim:
@@ -285,7 +286,6 @@ When you create an Azure disk for use with AKS, you can create the disk resource
285286
storageClassName: managed-csi
286287
csi:
287288
driver: disk.csi.azure.com
288-
readOnly: false
289289
volumeHandle: /subscriptions/<subscriptionID>/resourceGroups/MC_myAKSCluster_myAKSCluster_eastus/providers/Microsoft.Compute/disks/myAKSDisk
290290
volumeAttributes:
291291
fsType: ext4
@@ -351,6 +351,7 @@ When you create an Azure disk for use with AKS, you can create the disk resource
351351
volumeMounts:
352352
- name: azure
353353
mountPath: /mnt/azure
354+
volumeMounts
354355
volumes:
355356
- name: azure
356357
persistentVolumeClaim:

articles/aks/azure-csi-files-storage-provision.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ titleSuffix: Azure Kubernetes Service
44
description: Learn how to create a static or dynamic persistent volume with Azure Files for use with multiple concurrent pods in Azure Kubernetes Service (AKS)
55
ms.topic: article
66
ms.custom: devx-track-azurecli, devx-track-linux
7-
ms.date: 10/05/2023
7+
ms.date: 11/28/2023
88
---
99

1010
# Create and use a volume with Azure Files in Azure Kubernetes Service (AKS)
@@ -178,6 +178,7 @@ The following YAML creates a pod that uses the persistent volume claim *my-azure
178178
volumeMounts:
179179
- mountPath: /mnt/azure
180180
name: volume
181+
readOnly: false
181182
volumes:
182183
- name: volume
183184
persistentVolumeClaim:
@@ -343,7 +344,6 @@ Kubernetes needs credentials to access the file share created in the previous st
343344
storageClassName: azurefile-csi
344345
csi:
345346
driver: file.csi.azure.com
346-
readOnly: false
347347
volumeHandle: unique-volumeid # make sure this volumeid is unique for every identical share in the cluster
348348
volumeAttributes:
349349
resourceGroup: resourceGroupName # optional, only set this when storage account is not in the same resource group as node
@@ -453,11 +453,11 @@ spec:
453453
volumeMounts:
454454
- name: azure
455455
mountPath: /mnt/azure
456+
readOnly: false
456457
volumes:
457458
- name: azure
458459
csi:
459460
driver: file.csi.azure.com
460-
readOnly: false
461461
volumeAttributes:
462462
secretName: azure-secret # required
463463
shareName: aksshare # required

articles/aks/azure-disk-customer-managed-keys.md

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use a customer-managed key to encrypt Azure disks in Azure Kubernetes Ser
33
description: Bring your own keys (BYOK) to encrypt AKS OS and Data disks.
44
ms.topic: article
55
ms.custom: devx-track-azurecli, devx-track-linux
6-
ms.date: 09/12/2023
6+
ms.date: 11/24/2023
77
---
88

99
# Bring your own keys (BYOK) with Azure disks in Azure Kubernetes Service (AKS)
@@ -64,7 +64,7 @@ az disk-encryption-set create -n myDiskEncryptionSetName -l myAzureRegionName
6464
```
6565

6666
> [!IMPORTANT]
67-
> Ensure your AKS cluster identity has **read** permission of DiskEncryptionSet
67+
> Make sure that the DiskEncryptionSet is located in the same region as your AKS cluster and that the AKS cluster identity has **read** access to the DiskEncryptionSet.
6868
6969
## Grant the DiskEncryptionSet access to key vault
7070

@@ -119,6 +119,13 @@ If you have already provided a disk encryption set during cluster creation, encr
119119
> [!IMPORTANT]
120120
> Ensure you have the proper AKS credentials. The managed identity needs to have contributor access to the resource group where the diskencryptionset is deployed. Otherwise, you'll get an error suggesting that the managed identity does not have permissions.
121121
122+
To assign the AKS cluster identity the Contributor role for the diskencryptionset, execute the following commands:
123+
124+
```azurecli-interactive
125+
aksIdentity=$(az aks show -g $RG_NAME -n $CLUSTER_NAME --query "identity.principalId")
126+
az role assignment create --role "Contributor" --assignee $aksIdentity --scope $diskEncryptionSetId
127+
```
128+
122129
Create a file called **byok-azure-disk.yaml** that contains the following information. Replace *myAzureSubscriptionId*, *myResourceGroup*, and *myDiskEncrptionSetName* with your values, and apply the yaml. Make sure to use the resource group where your DiskEncryptionSet is deployed.
123130

124131
```yaml

articles/aks/azure-files-csi.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use Container Storage Interface (CSI) driver for Azure Files on Azure Kub
33
description: Learn how to use the Container Storage Interface (CSI) driver for Azure Files in an Azure Kubernetes Service (AKS) cluster.
44
ms.topic: article
55
ms.custom: devx-track-linux
6-
ms.date: 10/07/2023
6+
ms.date: 11/20/2023
77
---
88

99
# Use Azure Files Container Storage Interface (CSI) driver in Azure Kubernetes Service (AKS)
@@ -336,6 +336,8 @@ parameters:
336336
protocol: nfs
337337
mountOptions:
338338
- nconnect=4
339+
- noresvport
340+
- actimeo=30
339341
- rsize=262144
340342
- wsize=262144
341343
```
@@ -355,6 +357,8 @@ parameters:
355357
protocol: nfs
356358
mountOptions:
357359
- nconnect=4
360+
- noresvport
361+
- actimeo=30
358362
```
359363

360364
After editing and saving the file, create the storage class with the [kubectl apply][kubectl-apply] command:

articles/automation/automation-runbook-types.md

Lines changed: 23 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,29 @@ For example: if you're executing a runbook for a SharePoint automation scenario
5757

5858
The following are the current limitations and known issues with PowerShell runbooks:
5959

60+
# [PowerShell 7.2](#tab/lps72)
61+
62+
**Limitations**
63+
64+
> [!NOTE]
65+
> Currently, PowerShell 7.2 runtime version is supported for both Cloud and Hybrid jobs in all Public regions except Central India, UAE Central, Israel Central, Italy North, Germany North and Gov clouds.
66+
67+
- For the PowerShell 7.2 runtime version, the module activities aren't extracted for the imported modules.
68+
- PowerShell 7.x doesn't support workflows. For more information, see [PowerShell workflow](/powershell/scripting/whats-new/differences-from-windows-powershell#powershell-workflow) for more details.
69+
- PowerShell 7.x currently doesn't support signed runbooks.
70+
- Source control integration doesn't support PowerShell 7.2. Also, PowerShell 7.2 runbooks in source control get created in Automation account as Runtime 5.1.
71+
- Az module 8.3.0 is installed by default. The complete list of component modules of selected Az module version is shown once Az version is configured again using Azure portal or API.
72+
- The imported PowerShell 7.2 module would be validated during job execution. Ensure that all dependencies for the selected module are also imported for successful job execution.
73+
- Azure runbook doesn't support `Start-Job` with `-credential`.
74+
- Azure doesn't support all PowerShell input parameters. [Learn more](runbook-input-parameters.md).
75+
76+
**Known issues**
77+
- Runbooks taking dependency on internal file paths such as `C:\modules` might fail due to changes in service backend infrastructure. Change runbook code to ensure there are no dependencies on internal file paths and use [Get-ChildItem](/powershell/module/microsoft.powershell.management/get-childitem?view=powershell-7.3) to get the required module information.
78+
- `Get-AzStorageAccount` cmdlet might fail with an error: *The `Get-AzStorageAccount` command was found in the module `Az.Storage`, but the module could not be loaded*.
79+
- Executing child scripts using `.\child-runbook.ps1` is not supported in this preview.
80+
**Workaround**: Use `Start-AutomationRunbook` (internal cmdlet) or `Start-AzAutomationRunbook` (from *Az.Automation* module) to start another runbook from parent runbook.
81+
- When you use [ExchangeOnlineManagement](/powershell/exchange/exchange-online-powershell?view=exchange-ps&preserve-view=true) module version: 3.0.0 or higher, you can experience errors. To resolve the issue, ensure that you explicitly upload [PowerShellGet](/powershell/module/powershellget/) and [PackageManagement](/powershell/module/packagemanagement/) modules.
82+
6083
# [PowerShell 5.1](#tab/lps51)
6184

6285
**Limitations**
@@ -156,30 +179,6 @@ The following are the current limitations and known issues with PowerShell runbo
156179
- When you start PowerShell 7 runbook using the webhook, it auto-converts the webhook input parameter to an invalid JSON.
157180
- We recommend that you use [ExchangeOnlineManagement](/powershell/exchange/exchange-online-powershell?view=exchange-ps&preserve-view=true) module version: 3.0.0 or lower because version: 3.0.0 or higher may lead to job failures.
158181
- If you import module Az.Accounts with version 2.12.3 or newer, ensure that you import the **Newtonsoft.Json** v10 module explicitly if PowerShell 7.1 runbooks have a dependency on this version of the module. The workaround for this issue is to use PowerShell 7.2 runbooks.
159-
160-
161-
# [PowerShell 7.2](#tab/lps72)
162-
163-
**Limitations**
164-
165-
> [!NOTE]
166-
> Currently, PowerShell 7.2 runtime version is supported for both Cloud and Hybrid jobs in all Public regions except Central India, UAE Central, Israel Central, Italy North, Germany North and Gov clouds.
167-
168-
- For the PowerShell 7.2 runtime version, the module activities aren't extracted for the imported modules.
169-
- PowerShell 7.x doesn't support workflows. For more information, see [PowerShell workflow](/powershell/scripting/whats-new/differences-from-windows-powershell#powershell-workflow) for more details.
170-
- PowerShell 7.x currently doesn't support signed runbooks.
171-
- Source control integration doesn't support PowerShell 7.2. Also, PowerShell 7.2 runbooks in source control get created in Automation account as Runtime 5.1.
172-
- Az module 8.3.0 is installed by default. The complete list of component modules of selected Az module version is shown once Az version is configured again using Azure portal or API.
173-
- The imported PowerShell 7.2 module would be validated during job execution. Ensure that all dependencies for the selected module are also imported for successful job execution.
174-
- Azure runbook doesn't support `Start-Job` with `-credential`.
175-
- Azure doesn't support all PowerShell input parameters. [Learn more](runbook-input-parameters.md).
176-
177-
**Known issues**
178-
- Runbooks taking dependency on internal file paths such as `C:\modules` might fail due to changes in service backend infrastructure. Change runbook code to ensure there are no dependencies on internal file paths and use [Get-ChildItem](/powershell/module/microsoft.powershell.management/get-childitem?view=powershell-7.3) to get the required module information.
179-
- `Get-AzStorageAccount` cmdlet might fail with an error: *The `Get-AzStorageAccount` command was found in the module `Az.Storage`, but the module could not be loaded*.
180-
- Executing child scripts using `.\child-runbook.ps1` is not supported in this preview.
181-
**Workaround**: Use `Start-AutomationRunbook` (internal cmdlet) or `Start-AzAutomationRunbook` (from *Az.Automation* module) to start another runbook from parent runbook.
182-
- When you use [ExchangeOnlineManagement](/powershell/exchange/exchange-online-powershell?view=exchange-ps&preserve-view=true) module version: 3.0.0 or higher, you can experience errors. To resolve the issue, ensure that you explicitly upload [PowerShellGet](/powershell/module/powershellget/) and [PackageManagement](/powershell/module/packagemanagement/) modules.
183182
---
184183

185184
## PowerShell Workflow runbooks

articles/automation/whats-new.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Significant updates to Azure Automation updated each month.
44
services: automation
55
ms.subservice:
66
ms.topic: overview
7-
ms.date: 10/27/2023
7+
ms.date: 11/28/2023
88
ms.custom: references_regions
99
---
1010

@@ -21,10 +21,15 @@ Azure Automation receives improvements on an ongoing basis. To stay up to date w
2121

2222
This page is updated monthly, so revisit it regularly. If you're looking for items older than six months, you can find them in [Archive for What's new in Azure Automation](whats-new-archive.md).
2323

24-
## October 2023
24+
## November 2023
25+
26+
### General Availability: Azure Automation supports PowerShell 7.2 runbooks
2527

28+
Azure Automation announces General Availability of PowerShell 7.2 runbooks. This enables you to author runbooks in the long-term supported version of PowerShell using [Azure Automation extension for VS code](how-to/runbook-authoring-extension-for-vscode.md) and execute them on a secure and reliable platform. [Learn more](automation-runbook-types.md).
29+
30+
## October 2023
2631

27-
## General Availability: Automation extension for Visual Studio Code
32+
### General Availability: Automation extension for Visual Studio Code
2833

2934
Azure Automation now provides an advanced editing experience for PowerShell and Python scripts along with [runbook management operations](how-to/runbook-authoring-extension-for-vscode.md). For more information, see the [Key features and limitations](automation-runbook-authoring.md).
3035

articles/azure-app-configuration/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@
2626
- name: Python
2727
href: quickstart-python-provider.md
2828
- name: JavaScript/Node.js
29-
href: quickstart-javascript.md
29+
href: quickstart-javascript-provider.md
3030
- name: Azure Functions
3131
href: quickstart-azure-functions-csharp.md
3232
- name: Feature management
@@ -134,6 +134,8 @@
134134
href: cli-samples.md
135135
- name: Azure PowerShell
136136
href: powershell-samples.md
137+
- name: JavaScript SDK
138+
href: quickstart-javascript.md
137139
- name: Python SDK
138140
href: quickstart-python.md
139141
- name: Samples on GitHub

0 commit comments

Comments
 (0)