You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/tableau-online-provisioning-tutorial.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -194,7 +194,7 @@ This operation starts the initial synchronization cycle of all users and groups
194
194
195
195
In June 2022, Tableau released a SCIM 2.0 connector. Completing the steps below will update applications configured to use the Tableau API endpoint to the use the SCIM 2.0 endpoint. These steps will remove any customizations previously made to the Tableau Cloud application, including:
196
196
197
-
* Authentication details
197
+
* Authentication details (credentials used for provisioning, NOT the credentials used for SSO)
Copy file name to clipboardExpand all lines: articles/aks/cluster-configuration.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ AKS supports Ubuntu 18.04 as the default node operating system (OS) in general a
18
18
19
19
## Container runtime configuration
20
20
21
-
A container runtime is software that executes containers and manages container images on a node. The runtime helps abstract away sys-calls or operating system (OS) specific functionality to run containers on Linux or Windows. For Linux node pools, `containerd` is used for node pools using Kubernetes version 1.19 and greater. For Windows Server 2019 node pools, `containerd` is generally available and can be used in node pools using Kubernetes 1.20 and greater, but Docker is still used by default.
21
+
A container runtime is software that executes containers and manages container images on a node. The runtime helps abstract away sys-calls or operating system (OS) specific functionality to run containers on Linux or Windows. For Linux node pools, `containerd` is used for node pools using Kubernetes version 1.19 and greater. For Windows Server 2019 node pools, `containerd` is generally available and is used by default in Kubernetes 1.23 and greater. Docker is no longer supported as of September 2022. For more information about this deprecation, see the [AKS release notes][aks-release-notes].
22
22
23
23
[`Containerd`](https://containerd.io/) is an [OCI](https://opencontainers.org/) (Open Container Initiative) compliant core container runtime that provides the minimum set of required functionality to execute containers and manage images on a node. It was [donated](https://www.cncf.io/announcement/2017/03/29/containerd-joins-cloud-native-computing-foundation/) to the Cloud Native Compute Foundation (CNCF) in March of 2017. The current Moby (upstream Docker) version that AKS uses already leverages and is built on top of `containerd`, as shown above.
24
24
@@ -31,9 +31,9 @@ By using `containerd` for AKS nodes, pod startup latency improves and node resou
31
31
`Containerd` works on every GA version of Kubernetes in AKS, and in every upstream kubernetes version above v1.19, and supports all Kubernetes and AKS features.
32
32
33
33
> [!IMPORTANT]
34
-
> Clusters with Linux node pools created on Kubernetes v1.19 or greater default to `containerd` for its container runtime. Clusters with node pools on a earlier supported Kubernetes versions receive Docker for their container runtime. Linux node pools will be updated to `containerd` once the node pool Kubernetes version is updated to a version that supports `containerd`. You can still use Docker node pools and clusters on older supported versions until those fall off support.
34
+
> Clusters with Linux node pools created on Kubernetes v1.19 or greater default to `containerd` for its container runtime. Clusters with node pools on a earlier supported Kubernetes versions receive Docker for their container runtime. Linux node pools will be updated to `containerd` once the node pool Kubernetes version is updated to a version that supports `containerd`. You can still use Docker node pools and clusters on versions below 1.23, but Docker is no longer supported as of September 2022.
35
35
>
36
-
> Using `containerd` with Windows Server 2019 node pools is generally available, although the default for node pools created on Kubernetes v1.22 and earlier is still Docker. For more details, see [Add a Windows Server node pool with `containerd`][/learn/aks-add-np-containerd].
36
+
> Using `containerd` with Windows Server 2019 node pools is generally available, and is used by default in Kubernetes 1.23 and greater. For more details, see [Add a Windows Server node pool with `containerd`][/learn/aks-add-np-containerd].
37
37
>
38
38
> It is highly recommended to test your workloads on AKS node pools with `containerd` prior to using clusters with a Kubernetes version that supports `containerd` for your node pools.
39
39
@@ -219,6 +219,9 @@ az aks show -n aks -g myResourceGroup --query "oidcIssuerProfile.issuerUrl" -ots
219
219
- Read more about [Ephemeral OS disks](../virtual-machines/ephemeral-os-disks.md).
Copy file name to clipboardExpand all lines: articles/aks/learn/quick-windows-container-deploy-cli.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -192,7 +192,7 @@ Beginning in Kubernetes version 1.20 and greater, you can specify `containerd` a
192
192
Use the `az aks nodepool add` command to add a node pool that can run Windows Server containers with the `containerd` runtime.
193
193
194
194
> [!NOTE]
195
-
> If you do not specify the *WindowsContainerRuntime=containerd* custom header, the node pool will use Docker as the container runtime.
195
+
> If you do not specify the *WindowsContainerRuntime=containerd* custom header, the node pool will still use `containerd` as the container runtime by default.
196
196
197
197
```azurecli-interactive
198
198
az aks nodepool add \
@@ -236,7 +236,7 @@ az aks upgrade \
236
236
The above command upgrades all Windows Server node pools in the *myAKSCluster* to use the `containerd` runtime.
237
237
238
238
> [!NOTE]
239
-
> After upgrading all existing Windows Server node pools to use the `containerd` runtime, Docker will still be the default runtime when adding new Windows Server node pools.
239
+
> When running the upgrade command, the `--kubernetes-version` specified must be a higher version than the node pool's current version.
Copy file name to clipboardExpand all lines: articles/aks/limit-egress-traffic.md
+81-3Lines changed: 81 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn what ports and addresses are required to control egress traff
4
4
services: container-service
5
5
ms.topic: article
6
6
ms.author: jpalma
7
-
ms.date: 06/27/2022
7
+
ms.date: 07/05/2022
8
8
author: palma21
9
9
10
10
#Customer intent: As an cluster operator, I want to restrict egress traffic for nodes to only access defined ports and addresses and improve cluster security.
@@ -458,6 +458,13 @@ You'll define the outbound type to use the UDR that already exists on the subnet
458
458
>
459
459
> The AKS feature for [**API server authorized IP ranges**](api-server-authorized-ip-ranges.md) can be added to limit API server access to only the firewall's public endpoint. The authorized IP ranges feature is denoted in the diagram as optional. When enabling the authorized IP range feature to limit API server access, your developer tools must use a jumpbox from the firewall's virtual network or you must add all developer endpoints to the authorized IP range.
460
460
461
+
#### Create an AKS cluster with system-assigned identities
462
+
463
+
> [!NOTE]
464
+
> AKS will create a system-assigned kubelet identity in the Node resource group if you do not [specify your own kubelet managed identity][Use a pre-created kubelet managed identity].
465
+
466
+
You can create an AKS cluster using a system-assigned managed identity by running the following CLI command.
467
+
461
468
```azurecli
462
469
az aks create -g $RG -n $AKSNAME -l $LOC \
463
470
--node-count 3 \
@@ -470,8 +477,76 @@ az aks create -g $RG -n $AKSNAME -l $LOC \
470
477
> [!NOTE]
471
478
> For creating and using your own VNet and route table where the resources are outside of the worker node resource group, the CLI will add the role assignment automatically. If you are using an ARM template or other client, you need to use the Principal ID of the cluster managed identity to perform a [role assignment.][add role to identity]
472
479
>
473
-
> If you are not using the CLI but using your own VNet or route table which are outside of the worker node resource group, it's recommended to use [user-assigned control plane identity][Bring your own control plane managed identity]. For system-assigned control plane identity, we cannot get the identity ID before creating cluster, which causes delay for role assignment to take effect.
480
+
> If you are not using the CLI but using your own VNet or route table which are outside of the worker node resource group, it's recommended to use [user-assigned control plane identity][Create an AKS cluster with user-assigned identities]. For system-assigned control plane identity, we cannot get the identity ID before creating cluster, which causes delay for role assignment to take effect.
474
481
482
+
#### Create an AKS cluster with user-assigned identities
483
+
484
+
##### Create user-assigned managed identities
485
+
486
+
If you don't have a control plane managed identity, you can create by running the following [az identity create][az-identity-create] command:
487
+
488
+
```azurecli-interactive
489
+
az identity create --name myIdentity --resource-group myResourceGroup
##### Create an AKS cluster with user-assigned identities
533
+
534
+
Now you can use the following command to create your AKS cluster with your existing identities in the subnet. Provide the control plane identity resource ID via `assign-identity` and the kubelet managed identity via `assign-kubelet-identity`:
> For creating and using your own VNet and route table where the resources are outside of the worker node resource group, the CLI will add the role assignment automatically. If you are using an ARM template or other client, you need to use the Principal ID of the cluster managed identity to perform a [role assignment.][add role to identity]
475
550
476
551
### Enable developer access to the API server
477
552
@@ -796,4 +871,7 @@ If you want to restrict how pods communicate between themselves and East-West tr
796
871
[aks-faq]: faq.md
797
872
[aks-private-clusters]: private-clusters.md
798
873
[add role to identity]: use-managed-identity.md#add-role-assignment-for-control-plane-identity
799
-
[Bring your own control plane managed identity]: use-managed-identity.md#bring-your-own-control-plane-managed-identity
874
+
[Create an AKS cluster with user-assigned identities]: limit-egress-traffic.md#create-an-aks-cluster-with-user-assigned-identities
875
+
[Use a pre-created kubelet managed identity]: use-managed-identity.md#use-a-pre-created-kubelet-managed-identity
Container insights supports clusters running the Linux and Windows Server 2019 operating system. The container runtimes it supports are Docker, Moby, and any CRI compatible runtime such as CRI-O and ContainerD.
20
+
Container insights supports clusters running the Linux and Windows Server 2019 operating system. The container runtimes it supports are Moby and any CRI compatible runtime such as CRI-O and ContainerD. Docker is no longer supported as a container runtime as of September 2022. For more information about this deprecation, see the [AKS release notes][aks-release-notes].
21
21
22
22
>[!NOTE]
23
23
> Container insights support for Windows Server 2022 operating system in public preview.
@@ -66,3 +66,6 @@ The main differences in monitoring a Windows Server cluster compared to a Linux
66
66
## Next steps
67
67
68
68
To begin monitoring your Kubernetes cluster, review [How to enable Container insights](container-insights-onboard.md) to understand the requirements and available methods to enable monitoring.
0 commit comments