Skip to content

Commit 1651821

Browse files
authored
Merge pull request #205194 from MicrosoftDocs/main
7/19 OOB Publish at 8AM
2 parents 3e358aa + ac775d8 commit 1651821

File tree

95 files changed

+2790
-136
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

95 files changed

+2790
-136
lines changed

articles/active-directory/saas-apps/tableau-online-provisioning-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -194,7 +194,7 @@ This operation starts the initial synchronization cycle of all users and groups
194194

195195
In June 2022, Tableau released a SCIM 2.0 connector. Completing the steps below will update applications configured to use the Tableau API endpoint to the use the SCIM 2.0 endpoint. These steps will remove any customizations previously made to the Tableau Cloud application, including:
196196

197-
* Authentication details
197+
* Authentication details (credentials used for provisioning, NOT the credentials used for SSO)
198198
* Scoping filters
199199
* Custom attribute mappings
200200
>[!Note]

articles/aks/cluster-configuration.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ AKS supports Ubuntu 18.04 as the default node operating system (OS) in general a
1818

1919
## Container runtime configuration
2020

21-
A container runtime is software that executes containers and manages container images on a node. The runtime helps abstract away sys-calls or operating system (OS) specific functionality to run containers on Linux or Windows. For Linux node pools, `containerd` is used for node pools using Kubernetes version 1.19 and greater. For Windows Server 2019 node pools, `containerd` is generally available and can be used in node pools using Kubernetes 1.20 and greater, but Docker is still used by default.
21+
A container runtime is software that executes containers and manages container images on a node. The runtime helps abstract away sys-calls or operating system (OS) specific functionality to run containers on Linux or Windows. For Linux node pools, `containerd` is used for node pools using Kubernetes version 1.19 and greater. For Windows Server 2019 node pools, `containerd` is generally available and is used by default in Kubernetes 1.23 and greater. Docker is no longer supported as of September 2022. For more information about this deprecation, see the [AKS release notes][aks-release-notes].
2222

2323
[`Containerd`](https://containerd.io/) is an [OCI](https://opencontainers.org/) (Open Container Initiative) compliant core container runtime that provides the minimum set of required functionality to execute containers and manage images on a node. It was [donated](https://www.cncf.io/announcement/2017/03/29/containerd-joins-cloud-native-computing-foundation/) to the Cloud Native Compute Foundation (CNCF) in March of 2017. The current Moby (upstream Docker) version that AKS uses already leverages and is built on top of `containerd`, as shown above.
2424

@@ -31,9 +31,9 @@ By using `containerd` for AKS nodes, pod startup latency improves and node resou
3131
`Containerd` works on every GA version of Kubernetes in AKS, and in every upstream kubernetes version above v1.19, and supports all Kubernetes and AKS features.
3232

3333
> [!IMPORTANT]
34-
> Clusters with Linux node pools created on Kubernetes v1.19 or greater default to `containerd` for its container runtime. Clusters with node pools on a earlier supported Kubernetes versions receive Docker for their container runtime. Linux node pools will be updated to `containerd` once the node pool Kubernetes version is updated to a version that supports `containerd`. You can still use Docker node pools and clusters on older supported versions until those fall off support.
34+
> Clusters with Linux node pools created on Kubernetes v1.19 or greater default to `containerd` for its container runtime. Clusters with node pools on a earlier supported Kubernetes versions receive Docker for their container runtime. Linux node pools will be updated to `containerd` once the node pool Kubernetes version is updated to a version that supports `containerd`. You can still use Docker node pools and clusters on versions below 1.23, but Docker is no longer supported as of September 2022.
3535
>
36-
> Using `containerd` with Windows Server 2019 node pools is generally available, although the default for node pools created on Kubernetes v1.22 and earlier is still Docker. For more details, see [Add a Windows Server node pool with `containerd`][/learn/aks-add-np-containerd].
36+
> Using `containerd` with Windows Server 2019 node pools is generally available, and is used by default in Kubernetes 1.23 and greater. For more details, see [Add a Windows Server node pool with `containerd`][/learn/aks-add-np-containerd].
3737
>
3838
> It is highly recommended to test your workloads on AKS node pools with `containerd` prior to using clusters with a Kubernetes version that supports `containerd` for your node pools.
3939
@@ -219,6 +219,9 @@ az aks show -n aks -g myResourceGroup --query "oidcIssuerProfile.issuerUrl" -ots
219219
- Read more about [Ephemeral OS disks](../virtual-machines/ephemeral-os-disks.md).
220220

221221

222+
<!-- LINKS - external -->
223+
[aks-release-notes]: https://github.com/Azure/AKS/releases
224+
222225
<!-- LINKS - internal -->
223226
[azure-cli-install]: /cli/azure/install-azure-cli
224227
[az-feature-register]: /cli/azure/feature#az_feature_register

articles/aks/learn/quick-windows-container-deploy-cli.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -192,7 +192,7 @@ Beginning in Kubernetes version 1.20 and greater, you can specify `containerd` a
192192
Use the `az aks nodepool add` command to add a node pool that can run Windows Server containers with the `containerd` runtime.
193193

194194
> [!NOTE]
195-
> If you do not specify the *WindowsContainerRuntime=containerd* custom header, the node pool will use Docker as the container runtime.
195+
> If you do not specify the *WindowsContainerRuntime=containerd* custom header, the node pool will still use `containerd` as the container runtime by default.
196196
197197
```azurecli-interactive
198198
az aks nodepool add \
@@ -236,7 +236,7 @@ az aks upgrade \
236236
The above command upgrades all Windows Server node pools in the *myAKSCluster* to use the `containerd` runtime.
237237

238238
> [!NOTE]
239-
> After upgrading all existing Windows Server node pools to use the `containerd` runtime, Docker will still be the default runtime when adding new Windows Server node pools.
239+
> When running the upgrade command, the `--kubernetes-version` specified must be a higher version than the node pool's current version.
240240
241241
## Connect to the cluster
242242

articles/aks/limit-egress-traffic.md

Lines changed: 81 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn what ports and addresses are required to control egress traff
44
services: container-service
55
ms.topic: article
66
ms.author: jpalma
7-
ms.date: 06/27/2022
7+
ms.date: 07/05/2022
88
author: palma21
99

1010
#Customer intent: As an cluster operator, I want to restrict egress traffic for nodes to only access defined ports and addresses and improve cluster security.
@@ -458,6 +458,13 @@ You'll define the outbound type to use the UDR that already exists on the subnet
458458
>
459459
> The AKS feature for [**API server authorized IP ranges**](api-server-authorized-ip-ranges.md) can be added to limit API server access to only the firewall's public endpoint. The authorized IP ranges feature is denoted in the diagram as optional. When enabling the authorized IP range feature to limit API server access, your developer tools must use a jumpbox from the firewall's virtual network or you must add all developer endpoints to the authorized IP range.
460460
461+
#### Create an AKS cluster with system-assigned identities
462+
463+
> [!NOTE]
464+
> AKS will create a system-assigned kubelet identity in the Node resource group if you do not [specify your own kubelet managed identity][Use a pre-created kubelet managed identity].
465+
466+
You can create an AKS cluster using a system-assigned managed identity by running the following CLI command.
467+
461468
```azurecli
462469
az aks create -g $RG -n $AKSNAME -l $LOC \
463470
--node-count 3 \
@@ -470,8 +477,76 @@ az aks create -g $RG -n $AKSNAME -l $LOC \
470477
> [!NOTE]
471478
> For creating and using your own VNet and route table where the resources are outside of the worker node resource group, the CLI will add the role assignment automatically. If you are using an ARM template or other client, you need to use the Principal ID of the cluster managed identity to perform a [role assignment.][add role to identity]
472479
>
473-
> If you are not using the CLI but using your own VNet or route table which are outside of the worker node resource group, it's recommended to use [user-assigned control plane identity][Bring your own control plane managed identity]. For system-assigned control plane identity, we cannot get the identity ID before creating cluster, which causes delay for role assignment to take effect.
480+
> If you are not using the CLI but using your own VNet or route table which are outside of the worker node resource group, it's recommended to use [user-assigned control plane identity][Create an AKS cluster with user-assigned identities]. For system-assigned control plane identity, we cannot get the identity ID before creating cluster, which causes delay for role assignment to take effect.
474481
482+
#### Create an AKS cluster with user-assigned identities
483+
484+
##### Create user-assigned managed identities
485+
486+
If you don't have a control plane managed identity, you can create by running the following [az identity create][az-identity-create] command:
487+
488+
```azurecli-interactive
489+
az identity create --name myIdentity --resource-group myResourceGroup
490+
```
491+
492+
The output should resemble the following:
493+
494+
```output
495+
{
496+
"clientId": "<client-id>",
497+
"clientSecretUrl": "<clientSecretUrl>",
498+
"id": "/subscriptions/<subscriptionid>/resourcegroups/myResourceGroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/myIdentity",
499+
"location": "westus2",
500+
"name": "myIdentity",
501+
"principalId": "<principal-id>",
502+
"resourceGroup": "myResourceGroup",
503+
"tags": {},
504+
"tenantId": "<tenant-id>",
505+
"type": "Microsoft.ManagedIdentity/userAssignedIdentities"
506+
}
507+
```
508+
509+
If you don't have a kubelet managed identity, you can create one by running the following [az identity create][az-identity-create] command:
510+
511+
```azurecli-interactive
512+
az identity create --name myKubeletIdentity --resource-group myResourceGroup
513+
```
514+
515+
The output should resemble the following:
516+
517+
```output
518+
{
519+
"clientId": "<client-id>",
520+
"clientSecretUrl": "<clientSecretUrl>",
521+
"id": "/subscriptions/<subscriptionid>/resourcegroups/myResourceGroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/myKubeletIdentity",
522+
"location": "westus2",
523+
"name": "myKubeletIdentity",
524+
"principalId": "<principal-id>",
525+
"resourceGroup": "myResourceGroup",
526+
"tags": {},
527+
"tenantId": "<tenant-id>",
528+
"type": "Microsoft.ManagedIdentity/userAssignedIdentities"
529+
}
530+
```
531+
532+
##### Create an AKS cluster with user-assigned identities
533+
534+
Now you can use the following command to create your AKS cluster with your existing identities in the subnet. Provide the control plane identity resource ID via `assign-identity` and the kubelet managed identity via `assign-kubelet-identity`:
535+
536+
```azurecli
537+
az aks create -g $RG -n $AKSNAME -l $LOC \
538+
--node-count 3 \
539+
--network-plugin $PLUGIN \
540+
--outbound-type userDefinedRouting \
541+
--vnet-subnet-id $SUBNETID \
542+
--api-server-authorized-ip-ranges $FWPUBLIC_IP
543+
--enable-managed-identity \
544+
--assign-identity <identity-resource-id> \
545+
--assign-kubelet-identity <kubelet-identity-resource-id>
546+
```
547+
548+
> [!NOTE]
549+
> For creating and using your own VNet and route table where the resources are outside of the worker node resource group, the CLI will add the role assignment automatically. If you are using an ARM template or other client, you need to use the Principal ID of the cluster managed identity to perform a [role assignment.][add role to identity]
475550
476551
### Enable developer access to the API server
477552

@@ -796,4 +871,7 @@ If you want to restrict how pods communicate between themselves and East-West tr
796871
[aks-faq]: faq.md
797872
[aks-private-clusters]: private-clusters.md
798873
[add role to identity]: use-managed-identity.md#add-role-assignment-for-control-plane-identity
799-
[Bring your own control plane managed identity]: use-managed-identity.md#bring-your-own-control-plane-managed-identity
874+
[Create an AKS cluster with user-assigned identities]: limit-egress-traffic.md#create-an-aks-cluster-with-user-assigned-identities
875+
[Use a pre-created kubelet managed identity]: use-managed-identity.md#use-a-pre-created-kubelet-managed-identity
876+
[az-identity-create]: /cli/azure/identity#az_identity_create
877+
[az-aks-get-credentials]: /cli/azure/aks#az_aks_get_credentials

articles/azure-monitor/containers/container-insights-overview.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Container insights is a feature designed to monitor the performance of container
1717
- Self-managed Kubernetes clusters hosted on [Azure Stack](/azure-stack/user/azure-stack-kubernetes-aks-engine-overview) or on-premises
1818
- [Azure Arc-enabled Kubernetes](../../azure-arc/kubernetes/overview.md)
1919

20-
Container insights supports clusters running the Linux and Windows Server 2019 operating system. The container runtimes it supports are Docker, Moby, and any CRI compatible runtime such as CRI-O and ContainerD.
20+
Container insights supports clusters running the Linux and Windows Server 2019 operating system. The container runtimes it supports are Moby and any CRI compatible runtime such as CRI-O and ContainerD. Docker is no longer supported as a container runtime as of September 2022. For more information about this deprecation, see the [AKS release notes][aks-release-notes].
2121

2222
>[!NOTE]
2323
> Container insights support for Windows Server 2022 operating system in public preview.
@@ -66,3 +66,6 @@ The main differences in monitoring a Windows Server cluster compared to a Linux
6666
## Next steps
6767

6868
To begin monitoring your Kubernetes cluster, review [How to enable Container insights](container-insights-onboard.md) to understand the requirements and available methods to enable monitoring.
69+
70+
<!-- LINKS - external -->
71+
[aks-release-notes]: https://github.com/Azure/AKS/releases

0 commit comments

Comments
 (0)