Skip to content

Commit 1e66609

Browse files
committed
Resolving blocking issues
1 parent 92f39b9 commit 1e66609

File tree

3 files changed

+24
-25
lines changed

3 files changed

+24
-25
lines changed

articles/advisor/advisor-reference-operational-excellence-recommendations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -196,7 +196,7 @@ Learn more about [Kubernetes service - UseEphemeralOSdisk (Use Ephemeral OS disk
196196

197197
### Free and Standard pricing tiers for AKS control plane management
198198

199-
This cluster has not enabled the Standard pricing tier with the Uptime SLA feature, and it limited to an SLO of 99.5%
199+
This cluster has not enabled the Standard pricing tier with the Uptime SLA feature, and is limited to an SLO of 99.5%.
200200

201201
Learn more about [Kubernetes service - UseUptimeSLA (Use Uptime SLA)](../aks/free-standard-pricing-tiers.md).
202202

articles/aks/faq.md

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -36,15 +36,15 @@ Yes, you can use different virtual machine sizes in your AKS cluster by creating
3636

3737
## Are security updates applied to AKS agent nodes?
3838

39-
AKS patches CVE’s that have a "vendor fix" every week. CVE's without a fix are waiting on a "vendor fix" before it can be remediated. The AKS images will get automatically updated inside of 30 days and it recommended that customer apply an updated Node Image on a regular cadence to ensure that latest patched images and OS patches are all applied and current:
39+
AKS patches CVEs that have a "vendor fix" every week. CVEs without a fix are waiting on a "vendor fix" before it can be remediated. The AKS images will get automatically updated inside of 30 days. We recommend you apply an updated Node Image on a regular cadence to ensure that latest patched images and OS patches are all applied and current. You can do this using one of the following methods:
4040

4141
- Manually, through the Azure portal or the Azure CLI.
4242
- By upgrading your AKS cluster. The cluster upgrades [cordon and drain nodes][cordon-drain] automatically and then bring a new node online with the latest Ubuntu image and a new patch version or a minor Kubernetes version. For more information, see [Upgrade an AKS cluster][aks-upgrade].
4343
- By using [node image upgrade](node-image-upgrade.md).
4444

4545
## What is the size limit on a container image in AKS?
4646

47-
AKS does not set a limit on the container image size. However, it is important to understand that the larger the image, the higher the memory demand. This could potentially exceed resource limits or the overall available memory of worker nodes. By default, memory for VM size Standard_DS2_v2 for an AKS cluster is set to 7 GiB.
47+
AKS does not set a limit on the container image size. However, it is important to understand that the larger the image, the higher the memory demand. A larger size could potentially exceed resource limits or the overall available memory of worker nodes. By default, memory for VM size Standard_DS2_v2 for an AKS cluster is set to 7 GiB.
4848

4949
When a container image is excessively large, as in the Terabyte (TBs) range, kubelet might not be able to pull it from your container registry to a node due to lack of disk space.
5050

@@ -64,18 +64,18 @@ AKS uses a secure tunnel communication to allow the api-server and individual no
6464

6565
## Why are two resource groups created with AKS?
6666

67-
AKS builds upon many Azure infrastructure resources, including virtual machine scale sets, virtual networks, and managed disks. This enables you to apply many of the core capabilities of the Azure platform within the managed Kubernetes environment provided by AKS. For example, most Azure virtual machine types can be used directly with AKS and Azure Reservations can be used to receive discounts on those resources automatically.
67+
AKS builds upon many Azure infrastructure resources, including Virtual Machine Scale Sets, virtual networks, and managed disks, which enables you to apply many of the core capabilities of the Azure platform within the managed Kubernetes environment provided by AKS. For example, most Azure virtual machine types can be used directly with AKS and Azure Reservations can be used to receive discounts on those resources automatically.
6868

6969
To enable this architecture, each AKS deployment spans two resource groups:
7070

7171
1. You create the first resource group. This group contains only the Kubernetes service resource. The AKS resource provider automatically creates the second resource group during deployment. An example of the second resource group is *MC_myResourceGroup_myAKSCluster_eastus*. For information on how to specify the name of this second resource group, see the next section.
72-
1. The second resource group, known as the *node resource group*, contains all of the infrastructure resources associated with the cluster. These resources include the Kubernetes node VMs, virtual networking, and storage. By default, the node resource group has a name like *MC_myResourceGroup_myAKSCluster_eastus*. AKS automatically deletes the node resource group whenever the cluster is deleted, so it should only be used for resources that share the cluster's lifecycle.
72+
2. The second resource group, known as the *node resource group*, contains all of the infrastructure resources associated with the cluster. These resources include the Kubernetes node VMs, virtual networking, and storage. By default, the node resource group has a name like *MC_myResourceGroup_myAKSCluster_eastus*. AKS automatically deletes the node resource group whenever the cluster is deleted, so it should only be used for resources that share the cluster's lifecycle.
7373

7474
## Can I provide my own name for the AKS node resource group?
7575

7676
Yes. By default, AKS will name the node resource group *MC_resourcegroupname_clustername_location*, but you can also provide your own name.
7777

78-
To specify your own resource group name, install the [aks-preview][aks-preview-cli] Azure CLI extension version *0.3.2* or later. When you create an AKS cluster by using the [az aks create][az-aks-create] command, use the `--node-resource-group` parameter and specify a name for the resource group. If you [use an Azure Resource Manager template][aks-rm-template] to deploy an AKS cluster, you can define the resource group name by using the *nodeResourceGroup* property.
78+
To specify your own resource group name, install the [aks-preview][aks-preview-cli] Azure CLI extension version *0.3.2* or later. When you create an AKS cluster by using the [`az aks create`][az-aks-create] command, use the `--node-resource-group` parameter and specify a name for the resource group. If you [use an Azure Resource Manager template][aks-rm-template] to deploy an AKS cluster, you can define the resource group name by using the *nodeResourceGroup* property.
7979

8080
* The secondary resource group is automatically created by the Azure resource provider in your own subscription.
8181
* You can specify a custom resource group name only when you're creating the cluster.
@@ -90,7 +90,7 @@ As you work with the node resource group, keep in mind that you can't:
9090

9191
## Can I modify tags and other properties of the AKS resources in the node resource group?
9292

93-
If you modify or delete Azure-created tags and other resource properties in the node resource group, you could get unexpected results such as scaling and upgrading errors. AKS allows you to create and modify custom tags created by end users, and you can add those tags when [creating a node pool](use-multiple-node-pools.md#specify-a-taint-label-or-tag-for-a-node-pool). You might want to create or modify custom tags, for example, to assign a business unit or cost center. This can also be achieved by creating Azure Policies with a scope on the managed resource group.
93+
If you modify or delete Azure-created tags and other resource properties in the node resource group, you could get unexpected results, such as scaling and upgrading errors. AKS allows you to create and modify custom tags created by end users, and you can add those tags when [creating a node pool](use-multiple-node-pools.md#specify-a-taint-label-or-tag-for-a-node-pool). You might want to create or modify custom tags, for example, to assign a business unit or cost center. Another option is to create Azure Policies with a scope on the managed resource group.
9494

9595
However, modifying any **Azure-created tags** on resources under the node resource group in the AKS cluster is an unsupported action, which breaks the service-level objective (SLO). For more information, see [Does AKS offer a service-level agreement?](#does-aks-offer-a-service-level-agreement)
9696

@@ -114,7 +114,7 @@ Currently, you can't modify the list of admission controllers in AKS.
114114

115115
## Can I use admission controller webhooks on AKS?
116116

117-
Yes, you may use admission controller webhooks on AKS. It's recommended you exclude internal AKS namespaces, which are marked with the **control-plane label.** For example, by adding the below to the webhook configuration:
117+
Yes, you may use admission controller webhooks on AKS. It's recommended you exclude internal AKS namespaces, which are marked with the **control-plane label.** For example:
118118

119119
```
120120
namespaceSelector:
@@ -129,7 +129,7 @@ AKS firewalls the API server egress so your admission controller webhooks need t
129129

130130
To protect the stability of the system and prevent custom admission controllers from impacting internal services in the kube-system, namespace AKS has an **Admissions Enforcer**, which automatically excludes kube-system and AKS internal namespaces. This service ensures the custom admission controllers don't affect the services running in kube-system.
131131

132-
If you have a critical use case for deploying something on kube-system (not recommended) in support of your custom admission webhook, you may add the below label or annotation so that Admissions Enforcer ignores it.
132+
If you have a critical use case for deploying something on kube-system (not recommended) in support of your custom admission webhook, you may add the following label or annotation so that Admissions Enforcer ignores it.
133133

134134
Label: ```"admissions.enforcer/disabled": "true"``` or Annotation: ```"admissions.enforcer/disabled": true```
135135

@@ -147,7 +147,7 @@ Windows Server support for node pool includes some limitations that are part of
147147

148148
AKS provides SLA guarantees in the [Standard pricing tier with the Uptime SLA feature][pricing-tiers].
149149

150-
The Free pricing tier doesn't have a associated Service Level *Agreement*, but has a Service Level *Objective* of 99.5%. Transient connectivity issues are observed if there was an upgrade, unhealthy underlay nodes, platform maintenance, or an application overwhelms the API Server with requests, etc. For mission-critical and production workloads, or if your workload doesn't tolerate API Server restarts, we recommend using the Standard tier which includes Uptime SLA.
150+
The Free pricing tier doesn't have an associated Service Level *Agreement*, but has a Service Level *Objective* of 99.5%. Transient connectivity issues are observed if there was an upgrade, unhealthy underlay nodes, platform maintenance, or an application overwhelms the API Server with requests, etc. For mission-critical and production workloads, or if your workload doesn't tolerate API Server restarts, we recommend using the Standard tier, which includes Uptime SLA.
151151

152152
## Can I apply Azure reservation discounts to my AKS agent nodes?
153153

@@ -175,7 +175,7 @@ Most clusters are deleted upon user request; in some cases, especially where cus
175175

176176
## If I have pod / deployments in state 'NodeLost' or 'Unknown' can I still upgrade my cluster?
177177

178-
You can, but AKS doesn't recommend this. Upgrades should be performed when the state of the cluster is known and healthy.
178+
You can, but we don't recommend it. Upgrades should be performed when the state of the cluster is known and healthy.
179179

180180
## If I have a cluster with one or more nodes in an Unhealthy state or shut down, can I perform an upgrade?
181181

@@ -198,13 +198,13 @@ Confirm your service principal hasn't expired. See: [AKS service principal](./k
198198
You can completely [stop a running AKS cluster](start-stop-cluster.md), saving on the respective compute costs. Additionally, you may also choose to [scale or autoscale all or specific `User` node pools](scale-cluster.md#scale-user-node-pools-to-0) to 0, maintaining only the necessary cluster configuration.
199199
You can't directly scale [system node pools](use-system-pools.md) to zero.
200200

201-
## Can I use the virtual machine scale set APIs to scale manually?
201+
## Can I use the Virtual Machine Scale Set APIs to scale manually?
202202

203-
No, scale operations by using the virtual machine scale set APIs aren't supported. Use the AKS APIs (`az aks scale`).
203+
No, scale operations by using the Virtual Machine Scale Set APIs aren't supported. Use the AKS APIs (`az aks scale`).
204204

205-
## Can I use virtual machine scale sets to manually scale to zero nodes?
205+
## Can I use Virtual Machine Scale Sets to manually scale to zero nodes?
206206

207-
No, scale operations by using the virtual machine scale set APIs aren't supported. You can use the AKS API to scale to zero non-system node pools or [stop your cluster](start-stop-cluster.md) instead.
207+
No, scale operations by using the Virtual Machine Scale Set APIs aren't supported. You can use the AKS API to scale to zero non-system node pools or [stop your cluster](start-stop-cluster.md) instead.
208208

209209
## Can I stop or de-allocate all my VMs?
210210

@@ -237,7 +237,7 @@ As the name suggests, bridge mode Azure CNI, in a "just in time" fashion, will c
237237

238238
:::image type="content" source="media/faq/bridge-mode.png" alt-text="Bridge mode topology":::
239239

240-
Below is an example of how the ip route setup looks like in Bridge mode. Regardless of how many pods the node has, there will only ever be two routes. The first one saying, all traffic excluding local on azure0 will go to the default gateway of the subnet through the interface with ip "src 10.240.0.4" (which is Node primary IP) and the second one saying "10.20.x.x" Pod space to kernel for kernel to decide.
240+
The following example shows what the ip route setup looks like in Bridge mode. Regardless of how many pods the node has, there will only ever be two routes. The first one saying, all traffic excluding local on azure0 will go to the default gateway of the subnet through the interface with ip "src 10.240.0.4" (which is Node primary IP) and the second one saying "10.20.x.x" Pod space to kernel for kernel to decide.
241241

242242
```bash
243243
default via 10.240.0.1 dev azure0 proto dhcp src 10.240.0.4 metric 100
@@ -252,7 +252,7 @@ Transparent mode takes a straight forward approach to setting up Linux networkin
252252

253253
:::image type="content" source="media/faq/transparent-mode.png" alt-text="Transparent mode topology":::
254254

255-
Below is an example ip route setup of transparent mode, each Pod's interface will get a static route attached so that traffic with dest IP as the Pod will be sent directly to the Pod's host side `veth` pair interface.
255+
The following example shows a ip route setup of transparent mode. Each Pod's interface will get a static route attached so that traffic with dest IP as the Pod will be sent directly to the Pod's host side `veth` pair interface.
256256

257257
```bash
258258
10.240.0.216 dev azv79d05038592 proto static
@@ -295,15 +295,15 @@ The issue has been resolved with Kubernetes version 1.20. For more information,
295295
296296
## Can I use FIPS cryptographic libraries with deployments on AKS?
297297
298-
FIPS-enabled nodes are currently are now supported on Linux-based node pools. For more information, see [Add a FIPS-enabled node pool](use-multiple-node-pools.md#add-a-fips-enabled-node-pool).
298+
FIPS-enabled nodes are now supported on Linux-based node pools. For more information, see [Add a FIPS-enabled node pool](use-multiple-node-pools.md#add-a-fips-enabled-node-pool).
299299
300300
## Can I configure NSGs with AKS?
301301
302302
AKS doesn't apply Network Security Groups (NSGs) to its subnet and doesn't modify any of the NSGs associated with that subnet. AKS only modifies the network interfaces NSGs settings. If you're using CNI, you also must ensure the security rules in the NSGs allow traffic between the node and pod CIDR ranges. If you're using kubenet, you must also ensure the security rules in the NSGs allow traffic between the node and pod CIDR. For more information, see [Network security groups](concepts-network.md#network-security-groups).
303303
304-
## How does Time syncronization work in AKS?
304+
## How does Time synchronization work in AKS?
305305
306-
AKS nodes run the "chrony" service which pulls time from the localhost. Containers running on pods get the time from the AKS nodes. Applications launched inside a container use time from the container of the pod.
306+
AKS nodes run the "chrony" service, which pulls time from the localhost. Containers running on pods get the time from the AKS nodes. Applications launched inside a container use time from the container of the pod.
307307
308308
## How are AKS addons updated?
309309

articles/aks/free-standard-pricing-tiers.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,11 +15,10 @@ Azure Kubernetes Service (AKS) is now offering two pricing tiers for control pla
1515
|------------------|---------|--------|
1616
|**When to use**|• You want to experiment with AKS at no extra cost <br> • You're new to AKS and Kubernetes|• You're running production or mission-critical workloads and need high availability and reliability <br> • You need a financially backed SLA|
1717
|**Supported cluster types**|• Development clusters or small scale testing environments <br> • Clusters with fewer than 10 nodes|• Enterprise-grade or production workloads <br> • Clusters with up to 5,000 nodes|
18-
|**Pricing**|• Free cluster management <br> • Pay-as-you-go for resources you consume|$0.10 per cluster per hour for greater scaling and performance support <br> • Pay-as-you-go for resources you consume|
18+
|**Pricing**|• Free cluster management <br> • Pay-as-you-go for resources you consume|• Pay-as-you-go for resources you consume|
1919
|**Feature comparison**|• Recommended for clusters with fewer than 10 nodes, but can support up to 1,000 nodes <br> • Includes all current AKS features|• Uptime SLA is enabled by default <br> • Greater control plane reliability and resources <br> • Can support up to 5,000 nodes in a cluster <br> • Includes all current AKS features
2020

21-
> [!NOTE]
22-
> You can still create an unlimited number of free clusters with a service level objective (SLO) of 99.5% and opt for the preferred SLO.
21+
For more information on pricing, see the [AKS pricing details](https://azure.microsoft.com/pricing/details/kubernetes-service/).
2322

2423
## Uptime SLA
2524

@@ -37,11 +36,11 @@ Azure Kubernetes Service (AKS) is now offering two pricing tiers for control pla
3736
> "Basic" and "Paid" will be removed in the 2023-07-01 API version, and this will be a breaking change in API version 2023-07-01 or newer. If you use automated scripts, CD pipelines, ARM templates, Terraform, or other third-party tooling that relies on the above parameters, please be sure to make the necessary changes before upgrading to the 2023-07-01 or newer API version. From API version 2023-01-01 and newer, you can start transitioning to the new API parameters "Base" and "Standard".
3837
>
3938
40-
The Uptime SLA feature in the Standard tier enables a financially backed, higher SLA for your AKS clusters. Clusters in the Standard tier come with a greater amount of control plane resources and provide automatic scaling. The Uptime SLA feature guarantees 99.95% availability of the Kubernetes API server endpoint for clusters using [Availability Zones][availability-zones], and 99.9% of availability for clusters that aren't using Availability Zones. AKS uses main node replicas across update and fault domains to ensure the SLA requirements are met.
39+
For more information, see [SLA for AKS](https://azure.microsoft.com/support/legal/sla/kubernetes-service/v1_1/).
4140

4241
### Uptime SLA terms and conditions
4342

44-
The Uptime SLA feature is included in the Standard tier and is enabled per cluster. The pricing is $0.10 per cluster per hour. For more information, see the [AKS pricing details](https://azure.microsoft.com/pricing/details/kubernetes-service/).
43+
The Uptime SLA feature is included in the Standard tier and is enabled per cluster. For more information on pricing, see the [AKS pricing details](https://azure.microsoft.com/pricing/details/kubernetes-service/).
4544

4645
## Region availability
4746

0 commit comments

Comments
 (0)