Skip to content

Commit 39425f4

Browse files
authored
Merge pull request #220803 from JnHs/jh-arck8-refdec722
refresh and cleanup
2 parents d1a376f + bbaf250 commit 39425f4

File tree

2 files changed

+33
-35
lines changed

2 files changed

+33
-35
lines changed

articles/azure-arc/kubernetes/conceptual-agent-overview.md

Lines changed: 26 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -1,50 +1,49 @@
11
---
22
title: "Azure Arc-enabled Kubernetes agent overview"
3-
ms.date: 08/03/2021
3+
ms.date: 12/07/2022
44
ms.topic: conceptual
5-
description: "This article provides an overview of the Azure Arc agents deployed on the Kubernetes clusters when connecting them to Azure Arc."
5+
description: "Learn about the Azure Arc agents deployed on the Kubernetes clusters when connecting them to Azure Arc."
66
---
77

88
# Azure Arc-enabled Kubernetes agent overview
99

10-
[Kubernetes](https://kubernetes.io/) can deploy containerized workloads consistently on hybrid and multi-cloud environments. [Azure Arc-enabled Kubernetes](overview.md) provides a centralized, consistent control plane to manage policy, governance, and security across Kubernetes clusters on these heterogenous environments.
10+
[Azure Arc-enabled Kubernetes](overview.md) provides a centralized, consistent control plane to manage policy, governance, and security across Kubernetes clusters in different environments.
1111

12-
This article provides an overview of the Azure Arc agents deployed on the Kubernetes clusters when [connecting them to Azure Arc](quickstart-connect-cluster.md).
12+
Azure Arc agents are deployed on Kubernetes clusters when you [connect them to Azure Arc](quickstart-connect-cluster.md), This article provides an overview of these agents.
1313

1414
## Deploy agents to your cluster
1515

16-
Most on-premises datacenters enforce strict network rules that prevent inbound communication on the network boundary firewall. Azure Arc-enabled Kubernetes works with these restrictions by not requiring inbound ports on the firewall. Azure Arc agents only require outbound communication to a [set list of network endpoints](quickstart-connect-cluster.md#meet-network-requirements).
16+
Most on-premises datacenters enforce strict network rules that prevent inbound communication on the network boundary firewall. Azure Arc-enabled Kubernetes works with these restrictions by not requiring inbound ports on the firewall. Azure Arc agents require outbound communication to a [set list of network endpoints](quickstart-connect-cluster.md#meet-network-requirements).
1717

1818
:::image type="content" source="media/architectural-overview.png" alt-text="Diagram showing an architectural overview of the Azure Arc-enabled Kubernetes agents." lightbox="media/architectural-overview.png":::
1919

2020
The following high-level steps are involved in [connecting a Kubernetes cluster to Azure Arc](quickstart-connect-cluster.md):
2121

22-
1. Create a Kubernetes cluster on your choice of infrastructure (VMware vSphere, Amazon Web Services, Google Cloud Platform, etc.).
23-
24-
> [!NOTE]
25-
> Azure Arc-enabled Kubernetes currently only supports attaching existing Kubernetes clusters to Azure Arc. You must create the cluster before you connect it to Azure Arc.
22+
1. Create a Kubernetes cluster on your choice of infrastructure (VMware vSphere, Amazon Web Services, Google Cloud Platform, etc.). The cluster must already exist before you connect it to Azure Arc.
2623

2724
1. Start the Azure Arc registration for your cluster.
28-
* The agent Helm chart is deployed on the cluster.
29-
* The cluster nodes initiate an outbound communication to the [Microsoft Container Registry](https://github.com/microsoft/containerregistry), pulling the images needed to create the following agents in the `azure-arc` namespace:
30-
31-
| Agent | Description |
32-
| ----- | ----------- |
33-
| `deployment.apps/clusteridentityoperator` | Azure Arc-enabled Kubernetes currently supports only [system assigned identities](../../active-directory/managed-identities-azure-resources/overview.md). `clusteridentityoperator` initiates the first outbound communication. This first communication fetches the Managed Service Identity (MSI) certificate used by other agents for communication with Azure. |
34-
| `deployment.apps/config-agent` | Watches the connected cluster for source control configuration resources applied on the cluster. Updates the compliance state. |
35-
| `deployment.apps/controller-manager` | An operator of operators that orchestrates interactions between Azure Arc components. |
36-
| `deployment.apps/metrics-agent` | Collects metrics of other Arc agents to verify optimal performance. |
37-
| `deployment.apps/cluster-metadata-operator` | Gathers cluster metadata, including cluster version, node count, and Azure Arc agent version. |
38-
| `deployment.apps/resource-sync-agent` | Syncs the above-mentioned cluster metadata to Azure. |
39-
| `deployment.apps/flux-logs-agent` | Collects logs from the flux operators deployed as a part of source control configuration. |
40-
| `deployment.apps/extension-manager` | Installs and manages lifecycle of extension helm charts |
41-
| `deployment.apps/kube-aad-proxy` | Used for authentication of requests sent to the cluster using Cluster Connect. |
42-
| `deployment.apps/clusterconnect-agent` | Reverse proxy agent that enables the Cluster Connect feature to provide access to `apiserver` of the cluster. Optional component deployed only if the [Cluster Connect](conceptual-cluster-connect.md) feature is enabled. |
43-
| `deployment.apps/guard` | Authentication and authorization webhook server used for Azure Active Directory (Azure AD) RBAC. Optional component deployed only if [Azure RBAC](conceptual-azure-rbac.md) is enabled on the cluster. |
25+
26+
* The agent Helm chart is deployed on the cluster.
27+
* The cluster nodes initiate an outbound communication to the [Microsoft Container Registry](https://github.com/microsoft/containerregistry), pulling the images needed to create the following agents in the `azure-arc` namespace:
28+
29+
| Agent | Description |
30+
| ----- | ----------- |
31+
| `deployment.apps/clusteridentityoperator` | Azure Arc-enabled Kubernetes currently supports only [system assigned identities](../../active-directory/managed-identities-azure-resources/overview.md). `clusteridentityoperator` initiates the first outbound communication. This first communication fetches the Managed Service Identity (MSI) certificate used by other agents for communication with Azure. |
32+
| `deployment.apps/config-agent` | Watches the connected cluster for source control configuration resources applied on the cluster. Updates the compliance state. |
33+
| `deployment.apps/controller-manager` | An operator of operators that orchestrates interactions between Azure Arc components. |
34+
| `deployment.apps/metrics-agent` | Collects metrics of other Arc agents to verify optimal performance. |
35+
| `deployment.apps/cluster-metadata-operator` | Gathers cluster metadata, including cluster version, node count, and Azure Arc agent version. |
36+
| `deployment.apps/resource-sync-agent` | Syncs the above-mentioned cluster metadata to Azure. |
37+
| `deployment.apps/flux-logs-agent` | Collects logs from the Flux operators deployed as a part of [source control configuration](conceptual-gitops-flux2.md). |
38+
| `deployment.apps/extension-manager` | Installs and manages lifecycle of extension Helm charts. |
39+
| `deployment.apps/kube-aad-proxy` | Used for authentication of requests sent to the cluster using cluster connect. |
40+
| `deployment.apps/clusterconnect-agent` | Reverse proxy agent that enables the cluster connect feature to provide access to `apiserver` of the cluster. Optional component deployed only if the [cluster connect](conceptual-cluster-connect.md) feature is enabled. |
41+
| `deployment.apps/guard` | Authentication and authorization webhook server used for Azure Active Directory (Azure AD) RBAC. Optional component deployed only if [Azure RBAC](conceptual-azure-rbac.md) is enabled on the cluster. |
4442

4543
1. Once all the Azure Arc-enabled Kubernetes agent pods are in `Running` state, verify that your cluster is connected to Azure Arc. You should see:
46-
* An Azure Arc-enabled Kubernetes resource in [Azure Resource Manager](../../azure-resource-manager/management/overview.md). Azure tracks this resource as a projection of the customer-managed Kubernetes cluster, not the actual Kubernetes cluster itself.
47-
* Cluster metadata (such as Kubernetes version, agent version, and number of nodes) appearing on the Azure Arc-enabled Kubernetes resource as metadata.
44+
45+
* An Azure Arc-enabled Kubernetes resource in [Azure Resource Manager](../../azure-resource-manager/management/overview.md). Azure tracks this resource as a projection of the customer-managed Kubernetes cluster, not the actual Kubernetes cluster itself.
46+
* Cluster metadata (such as Kubernetes version, agent version, and number of nodes) appearing on the Azure Arc-enabled Kubernetes resource as metadata.
4847

4948
## Next steps
5049

articles/azure-arc/kubernetes/validation-program.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
22
title: "Azure Arc-enabled Kubernetes validation"
3-
ms.date: 03/03/2021
3+
ms.date: 12/07/2022
44
ms.topic: how-to
55
description: "Describes Arc validation program for Kubernetes distributions"
66
---
77

88
# Azure Arc-enabled Kubernetes validation
99

10-
Azure Arc-enabled Kubernetes works with any Cloud Native Computing Foundation (CNCF) certified Kubernetes clusters. The Azure Arc team has also worked with key industry Kubernetes offering providers to validate Azure Arc-enabled Kubernetes with their Kubernetes distributions. Future major and minor versions of Kubernetes distributions released by these providers will be validated for compatibility with Azure Arc-enabled Kubernetes.
10+
Azure Arc-enabled Kubernetes works with any Kubernetes clusters that are certified by the Cloud Native Computing Foundation (CNCF). The Azure Arc team has also worked with key industry Kubernetes offering providers to validate Azure Arc-enabled Kubernetes with their Kubernetes distributions. Future major and minor versions of Kubernetes distributions released by these providers will be validated for compatibility with Azure Arc-enabled Kubernetes.
1111

1212
## Validated distributions
1313

14-
The following Microsoft provided Kubernetes distributions and infrastructure providers have successfully passed the conformance tests for Azure Arc-enabled Kubernetes:
14+
The following Microsoft-provided Kubernetes distributions and infrastructure providers have successfully passed the conformance tests for Azure Arc-enabled Kubernetes:
1515

1616
| Distribution and infrastructure provider | Version |
1717
| ---------------------------------------- | ------- |
@@ -44,17 +44,16 @@ The Azure Arc team also ran the conformance tests and validated Azure Arc-enable
4444

4545
The conformance tests run as part of the Azure Arc-enabled Kubernetes validation cover the following scenarios:
4646

47-
1. Connect Kubernetes clusters to Azure Arc:
47+
1. Connect Kubernetes clusters to Azure Arc:
4848
* Deploy Azure Arc-enabled Kubernetes agent Helm chart on cluster.
4949
* Agents send cluster metadata to Azure.
5050

51-
2. Configuration:
51+
2. Configuration:
5252
* Create configuration on top of Azure Arc-enabled Kubernetes resource.
5353
* [Flux](https://docs.fluxcd.io/), needed for setting up GitOps workflow, is deployed on the cluster.
5454
* Flux pulls manifests and Helm charts from demo Git repo and deploys to cluster.
5555

5656
## Next steps
5757

58-
Learn how to connect your existing Kubernetes cluster to Azure Arc.
59-
> [!div class="nextstepaction"]
60-
> [Connect an existing Kubernetes cluster to Azure Arc](./quickstart-connect-cluster.md)
58+
* [Learn how to connect an existing Kubernetes cluster to Azure Arc](./quickstart-connect-cluster.md)
59+
* Learn about the [Azure Arc agents](conceptual-agent-overview.md) deployed on Kubernetes clusters when connecting them to Azure Arc.

0 commit comments

Comments
 (0)