You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/azure-blob-csi.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Use Container Storage Interface (CSI) driver for Azure Blob storage on Az
3
3
description: Learn how to use the Container Storage Interface (CSI) driver for Azure Blob storage in an Azure Kubernetes Service (AKS) cluster.
4
4
ms.topic: article
5
5
ms.custom: devx-track-linux
6
-
ms.date: 11/01/2023
6
+
ms.date: 11/24/2023
7
7
---
8
8
9
9
# Use Azure Blob storage Container Storage Interface (CSI) driver
@@ -33,6 +33,8 @@ Azure Blob storage CSI driver supports the following features:
33
33
- You need the Azure CLI version 2.42 or later installed and configured. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI][install-azure-cli].
34
34
35
35
- Perform the steps in this [link][csi-blob-storage-open-source-driver-uninstall-steps] if you previously installed the [CSI Blob Storage open-source driver][csi-blob-storage-open-source-driver] to access Azure Blob storage from your cluster.
36
+
> [!NOTE]
37
+
> If the blobfuse-proxy is not enabled during the installation of the open source driver, the uninstallation of the open source driver will disrupt existing blobfuse mounts. However, NFS mounts will remain unaffected.
36
38
37
39
## Enable CSI driver on a new or existing AKS cluster
Copy file name to clipboardExpand all lines: articles/aks/azure-csi-blob-storage-provision.md
+12-8Lines changed: 12 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ titleSuffix: Azure Kubernetes Service
4
4
description: Learn how to create a static or dynamic persistent volume with Azure Blob storage for use with multiple concurrent pods in Azure Kubernetes Service (AKS)
5
5
ms.topic: article
6
6
ms.custom: devx-track-linux
7
-
ms.date: 09/06/2023
7
+
ms.date: 11/28/2023
8
8
---
9
9
10
10
# Create and use a volume with Azure Blob storage in Azure Kubernetes Service (AKS)
@@ -28,6 +28,7 @@ For more information on Kubernetes volumes, see [Storage options for application
28
28
29
29
- To create an ADLS account using the driver in dynamic provisioning, specify `isHnsEnabled: "true"` in the storage class parameters.
30
30
- To enable blobfuse access to an ADLS account in static provisioning, specify the mount option `--use-adls=true` in the persistent volume.
31
+
- If you are going to enable a storage account with Hierarchical Namespace, existing persistent volumes should be remounted with `--use-adls=true` mount option.
31
32
32
33
## Dynamically provision a volume
33
34
@@ -72,12 +73,10 @@ A persistent volume claim (PVC) uses the storage class object to dynamically pro
Copy file name to clipboardExpand all lines: articles/aks/azure-csi-disk-storage-provision.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ titleSuffix: Azure Kubernetes Service
4
4
description: Learn how to create a static or dynamic persistent volume with Azure Disks for use with multiple concurrent pods in Azure Kubernetes Service (AKS)
5
5
ms.topic: article
6
6
ms.custom: devx-track-azurecli, devx-track-linux
7
-
ms.date: 04/11/2023
7
+
ms.date: 11/28/2023
8
8
---
9
9
10
10
# Create and use a volume with Azure Disks in Azure Kubernetes Service (AKS)
@@ -165,6 +165,7 @@ After you create the persistent volume claim, you must verify it has a status of
165
165
volumeMounts:
166
166
- mountPath: "/mnt/azure"
167
167
name: volume
168
+
readOnly: false
168
169
volumes:
169
170
- name: volume
170
171
persistentVolumeClaim:
@@ -285,7 +286,6 @@ When you create an Azure disk for use with AKS, you can create the disk resource
Copy file name to clipboardExpand all lines: articles/aks/azure-csi-files-storage-provision.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ titleSuffix: Azure Kubernetes Service
4
4
description: Learn how to create a static or dynamic persistent volume with Azure Files for use with multiple concurrent pods in Azure Kubernetes Service (AKS)
5
5
ms.topic: article
6
6
ms.custom: devx-track-azurecli, devx-track-linux
7
-
ms.date: 10/05/2023
7
+
ms.date: 11/28/2023
8
8
---
9
9
10
10
# Create and use a volume with Azure Files in Azure Kubernetes Service (AKS)
@@ -178,6 +178,7 @@ The following YAML creates a pod that uses the persistent volume claim *my-azure
178
178
volumeMounts:
179
179
- mountPath: /mnt/azure
180
180
name: volume
181
+
readOnly: false
181
182
volumes:
182
183
- name: volume
183
184
persistentVolumeClaim:
@@ -343,7 +344,6 @@ Kubernetes needs credentials to access the file share created in the previous st
343
344
storageClassName: azurefile-csi
344
345
csi:
345
346
driver: file.csi.azure.com
346
-
readOnly: false
347
347
volumeHandle: unique-volumeid # make sure this volumeid is unique for every identical share in the cluster
348
348
volumeAttributes:
349
349
resourceGroup: resourceGroupName # optional, only set this when storage account is not in the same resource group as node
> Ensure your AKS cluster identity has **read**permission of DiskEncryptionSet
67
+
> Make sure that the DiskEncryptionSet is located in the same region as your AKS cluster and that the AKS cluster identity has **read**access to the DiskEncryptionSet.
68
68
69
69
## Grant the DiskEncryptionSet access to key vault
70
70
@@ -119,6 +119,13 @@ If you have already provided a disk encryption set during cluster creation, encr
119
119
> [!IMPORTANT]
120
120
> Ensure you have the proper AKS credentials. The managed identity needs to have contributor access to the resource group where the diskencryptionset is deployed. Otherwise, you'll get an error suggesting that the managed identity does not have permissions.
121
121
122
+
To assign the AKS cluster identity the Contributor role for the diskencryptionset, execute the following commands:
123
+
124
+
```azurecli-interactive
125
+
aksIdentity=$(az aks show -g $RG_NAME -n $CLUSTER_NAME --query "identity.principalId")
126
+
az role assignment create --role "Contributor" --assignee $aksIdentity --scope $diskEncryptionSetId
127
+
```
128
+
122
129
Create a file called **byok-azure-disk.yaml** that contains the following information. Replace *myAzureSubscriptionId*, *myResourceGroup*, and *myDiskEncrptionSetName* with your values, and apply the yaml. Make sure to use the resource group where your DiskEncryptionSet is deployed.
Copy file name to clipboardExpand all lines: articles/automation/automation-runbook-types.md
+23-24Lines changed: 23 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,6 +57,29 @@ For example: if you're executing a runbook for a SharePoint automation scenario
57
57
58
58
The following are the current limitations and known issues with PowerShell runbooks:
59
59
60
+
# [PowerShell 7.2](#tab/lps72)
61
+
62
+
**Limitations**
63
+
64
+
> [!NOTE]
65
+
> Currently, PowerShell 7.2 runtime version is supported for both Cloud and Hybrid jobs in all Public regions except Central India, UAE Central, Israel Central, Italy North, Germany North and Gov clouds.
66
+
67
+
- For the PowerShell 7.2 runtime version, the module activities aren't extracted for the imported modules.
68
+
- PowerShell 7.x doesn't support workflows. For more information, see [PowerShell workflow](/powershell/scripting/whats-new/differences-from-windows-powershell#powershell-workflow) for more details.
69
+
- PowerShell 7.x currently doesn't support signed runbooks.
70
+
- Source control integration doesn't support PowerShell 7.2. Also, PowerShell 7.2 runbooks in source control get created in Automation account as Runtime 5.1.
71
+
- Az module 8.3.0 is installed by default. The complete list of component modules of selected Az module version is shown once Az version is configured again using Azure portal or API.
72
+
- The imported PowerShell 7.2 module would be validated during job execution. Ensure that all dependencies for the selected module are also imported for successful job execution.
73
+
- Azure runbook doesn't support `Start-Job` with `-credential`.
74
+
- Azure doesn't support all PowerShell input parameters. [Learn more](runbook-input-parameters.md).
75
+
76
+
**Known issues**
77
+
- Runbooks taking dependency on internal file paths such as `C:\modules` might fail due to changes in service backend infrastructure. Change runbook code to ensure there are no dependencies on internal file paths and use [Get-ChildItem](/powershell/module/microsoft.powershell.management/get-childitem?view=powershell-7.3) to get the required module information.
78
+
-`Get-AzStorageAccount` cmdlet might fail with an error: *The `Get-AzStorageAccount` command was found in the module `Az.Storage`, but the module could not be loaded*.
79
+
- Executing child scripts using `.\child-runbook.ps1` is not supported in this preview.
80
+
**Workaround**: Use `Start-AutomationRunbook` (internal cmdlet) or `Start-AzAutomationRunbook` (from *Az.Automation* module) to start another runbook from parent runbook.
81
+
- When you use [ExchangeOnlineManagement](/powershell/exchange/exchange-online-powershell?view=exchange-ps&preserve-view=true) module version: 3.0.0 or higher, you can experience errors. To resolve the issue, ensure that you explicitly upload [PowerShellGet](/powershell/module/powershellget/) and [PackageManagement](/powershell/module/packagemanagement/) modules.
82
+
60
83
# [PowerShell 5.1](#tab/lps51)
61
84
62
85
**Limitations**
@@ -156,30 +179,6 @@ The following are the current limitations and known issues with PowerShell runbo
156
179
- When you start PowerShell 7 runbook using the webhook, it auto-converts the webhook input parameter to an invalid JSON.
157
180
- We recommend that you use [ExchangeOnlineManagement](/powershell/exchange/exchange-online-powershell?view=exchange-ps&preserve-view=true) module version: 3.0.0 or lower because version: 3.0.0 or higher may lead to job failures.
158
181
- If you import module Az.Accounts with version 2.12.3 or newer, ensure that you import the **Newtonsoft.Json** v10 module explicitly if PowerShell 7.1 runbooks have a dependency on this version of the module. The workaround for this issue is to use PowerShell 7.2 runbooks.
159
-
160
-
161
-
# [PowerShell 7.2](#tab/lps72)
162
-
163
-
**Limitations**
164
-
165
-
> [!NOTE]
166
-
> Currently, PowerShell 7.2 runtime version is supported for both Cloud and Hybrid jobs in all Public regions except Central India, UAE Central, Israel Central, Italy North, Germany North and Gov clouds.
167
-
168
-
- For the PowerShell 7.2 runtime version, the module activities aren't extracted for the imported modules.
169
-
- PowerShell 7.x doesn't support workflows. For more information, see [PowerShell workflow](/powershell/scripting/whats-new/differences-from-windows-powershell#powershell-workflow) for more details.
170
-
- PowerShell 7.x currently doesn't support signed runbooks.
171
-
- Source control integration doesn't support PowerShell 7.2. Also, PowerShell 7.2 runbooks in source control get created in Automation account as Runtime 5.1.
172
-
- Az module 8.3.0 is installed by default. The complete list of component modules of selected Az module version is shown once Az version is configured again using Azure portal or API.
173
-
- The imported PowerShell 7.2 module would be validated during job execution. Ensure that all dependencies for the selected module are also imported for successful job execution.
174
-
- Azure runbook doesn't support `Start-Job` with `-credential`.
175
-
- Azure doesn't support all PowerShell input parameters. [Learn more](runbook-input-parameters.md).
176
-
177
-
**Known issues**
178
-
- Runbooks taking dependency on internal file paths such as `C:\modules` might fail due to changes in service backend infrastructure. Change runbook code to ensure there are no dependencies on internal file paths and use [Get-ChildItem](/powershell/module/microsoft.powershell.management/get-childitem?view=powershell-7.3) to get the required module information.
179
-
-`Get-AzStorageAccount` cmdlet might fail with an error: *The `Get-AzStorageAccount` command was found in the module `Az.Storage`, but the module could not be loaded*.
180
-
- Executing child scripts using `.\child-runbook.ps1` is not supported in this preview.
181
-
**Workaround**: Use `Start-AutomationRunbook` (internal cmdlet) or `Start-AzAutomationRunbook` (from *Az.Automation* module) to start another runbook from parent runbook.
182
-
- When you use [ExchangeOnlineManagement](/powershell/exchange/exchange-online-powershell?view=exchange-ps&preserve-view=true) module version: 3.0.0 or higher, you can experience errors. To resolve the issue, ensure that you explicitly upload [PowerShellGet](/powershell/module/powershellget/) and [PackageManagement](/powershell/module/packagemanagement/) modules.
Copy file name to clipboardExpand all lines: articles/automation/whats-new.md
+8-3Lines changed: 8 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Significant updates to Azure Automation updated each month.
4
4
services: automation
5
5
ms.subservice:
6
6
ms.topic: overview
7
-
ms.date: 10/27/2023
7
+
ms.date: 11/28/2023
8
8
ms.custom: references_regions
9
9
---
10
10
@@ -21,10 +21,15 @@ Azure Automation receives improvements on an ongoing basis. To stay up to date w
21
21
22
22
This page is updated monthly, so revisit it regularly. If you're looking for items older than six months, you can find them in [Archive for What's new in Azure Automation](whats-new-archive.md).
23
23
24
-
## October 2023
24
+
## November 2023
25
+
26
+
### General Availability: Azure Automation supports PowerShell 7.2 runbooks
25
27
28
+
Azure Automation announces General Availability of PowerShell 7.2 runbooks. This enables you to author runbooks in the long-term supported version of PowerShell using [Azure Automation extension for VS code](how-to/runbook-authoring-extension-for-vscode.md) and execute them on a secure and reliable platform. [Learn more](automation-runbook-types.md).
29
+
30
+
## October 2023
26
31
27
-
## General Availability: Automation extension for Visual Studio Code
32
+
###General Availability: Automation extension for Visual Studio Code
28
33
29
34
Azure Automation now provides an advanced editing experience for PowerShell and Python scripts along with [runbook management operations](how-to/runbook-authoring-extension-for-vscode.md). For more information, see the [Key features and limitations](automation-runbook-authoring.md).
0 commit comments