Skip to content

Commit 3bd567c

Browse files
authored
Merge pull request #215810 from MicrosoftDocs/main
10/25 AM Publish
2 parents 96d8a3b + 676e158 commit 3bd567c

File tree

163 files changed

+3382
-1316
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

163 files changed

+3382
-1316
lines changed

.openpublishing.redirection.virtual-desktop.json

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,46 @@
3434
"source_path": "articles/virtual-desktop/azure-stack-hci-faq.yml",
3535
"redirect_url": "/azure/virtual-desktop/azure-stack-hci",
3636
"redirect_document_id": false
37+
},
38+
{
39+
"source_path_from_root": "/articles/virtual-desktop/user-documentation/connect-android.md",
40+
"redirect_url": "/azure/virtual-desktop/users/connect-android-chrome-os",
41+
"redirect_document_id": true
42+
},
43+
{
44+
"source_path_from_root": "/articles/virtual-desktop/user-documentation/connect-ios.md",
45+
"redirect_url": "/azure/virtual-desktop/users/connect-ios-ipados",
46+
"redirect_document_id": true
47+
},
48+
{
49+
"source_path_from_root": "/articles/virtual-desktop/user-documentation/connect-macos.md",
50+
"redirect_url": "/azure/virtual-desktop/users/connect-macos",
51+
"redirect_document_id": true
52+
},
53+
{
54+
"source_path_from_root": "/articles/virtual-desktop/user-documentation/connect-microsoft-store.md",
55+
"redirect_url": "/azure/virtual-desktop/users/connect-microsoft-store",
56+
"redirect_document_id": true
57+
},
58+
{
59+
"source_path_from_root": "/articles/virtual-desktop/user-documentation/connect-web.md",
60+
"redirect_url": "/azure/virtual-desktop/users/connect-web",
61+
"redirect_document_id": true
62+
},
63+
{
64+
"source_path_from_root": "/articles/virtual-desktop/user-documentation/connect-windows-7-10.md",
65+
"redirect_url": "/azure/virtual-desktop/users/connect-windows",
66+
"redirect_document_id": true
67+
},
68+
{
69+
"source_path_from_root": "/articles/virtual-desktop/user-documentation/index.yml",
70+
"redirect_url": "/azure/virtual-desktop/users/",
71+
"redirect_document_id": true
72+
},
73+
{
74+
"source_path_from_root": "/articles/virtual-desktop/user-documentation/linux-overview.md",
75+
"redirect_url": "/azure/virtual-desktop/users/connect-thin-clients",
76+
"redirect_document_id": true
3777
}
3878
]
3979
}

articles/active-directory/fundamentals/users-default-permissions.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,6 @@ You can restrict default permissions for member users in the following ways:
5353
| Permission | Setting explanation |
5454
| ---------- | ------------ |
5555
| **Register applications** | Setting this option to **No** prevents users from creating application registrations. You can the grant the ability back to specific individuals by adding them to the application developer role. |
56-
| **Create tenants** | Setting this option to **No** prevents users from creating new Azure AD or Azure AD B2C tenants. You can grant the ability back to specific individuals by adding them to tenant creator role. |
5756
| **Allow users to connect work or school account with LinkedIn** | Setting this option to **No** prevents users from connecting their work or school account with their LinkedIn account. For more information, see [LinkedIn account connections data sharing and consent](../enterprise-users/linkedin-user-consent.md). |
5857
| **Create security groups** | Setting this option to **No** prevents users from creating security groups. Global administrators and user administrators can still create security groups. To learn how, see [Azure Active Directory cmdlets for configuring group settings](../enterprise-users/groups-settings-cmdlets.md). |
5958
| **Create Microsoft 365 groups** | Setting this option to **No** prevents users from creating Microsoft 365 groups. Setting this option to **Some** allows a set of users to create Microsoft 365 groups. Global administrators and user administrators can still create Microsoft 365 groups. To learn how, see [Azure Active Directory cmdlets for configuring group settings](../enterprise-users/groups-settings-cmdlets.md). |

articles/active-directory/managed-identities-azure-resources/managed-identities-status.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,7 @@ The following Azure services support managed identities for Azure resources:
4747
| Azure DevTest Labs | [Enable user-assigned managed identities on lab virtual machines in Azure DevTest Labs](../../devtest-labs/enable-managed-identities-lab-vms.md) |
4848
| Azure Digital Twins | [Enable a managed identity for routing Azure Digital Twins events](../../digital-twins/how-to-enable-managed-identities-portal.md) |
4949
| Azure Event Grid | [Event delivery with a managed identity](../../event-grid/managed-service-identity.md)
50+
| Azure Event Hubs | [Authenticate a managed identity with Azure Active Directory to access Event Hubs Resources](../../event-hubs/authenticate-managed-identity.md)
5051
| Azure Image Builder | [Azure Image Builder overview](../../virtual-machines/image-builder-overview.md#permissions) |
5152
| Azure Import/Export | [Use customer-managed keys in Azure Key Vault for Import/Export service](../../import-export/storage-import-export-encryption-key-portal.md)
5253
| Azure IoT Hub | [IoT Hub support for virtual networks with Private Link and Managed Identity](../../iot-hub/virtual-network-support.md) |

articles/aks/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -378,6 +378,8 @@
378378
href: internal-lb.md
379379
- name: Use a Standard Load Balancer
380380
href: load-balancer-standard.md
381+
- name: Use kube-proxy configuration (IPVS)
382+
href: configure-kube-proxy.md
381383
- name: Use a static IP address and DNS label
382384
href: static-ip.md
383385
- name: Use an HTTP proxy

articles/aks/azure-cni-overlay.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,8 +14,9 @@ The traditional [Azure Container Networking Interface (CNI)](./configure-azure-c
1414
With Azure CNI Overlay, the cluster nodes are deployed into an Azure Virtual Network subnet, whereas pods are assigned IP addresses from a private CIDR logically different from the VNet hosting the nodes. Pod and node traffic within the cluster use an overlay network, and Network Address Translation (via the node's IP address) is used to reach resources outside the cluster. This solution saves a significant amount of VNet IP addresses and enables you to seamlessly scale your cluster to very large sizes. An added advantage is that the private CIDR can be reused in different AKS clusters, truly extending the IP space available for containerized applications in AKS.
1515

1616
> [!NOTE]
17-
> - Azure CNI Overlay is currently only available in US West Central region.
18-
17+
> Azure CNI Overlay is currently available in the following regions:
18+
> - North Central US
19+
> - West Central US
1920
## Overview of overlay networking
2021

2122
In overlay networking, only the Kubernetes cluster nodes are assigned IPs from a subnet. Pods receive IPs from a private CIDR that is provided at the time of cluster creation. Each node is assigned a `/24` address space carved out from the same CIDR. Additional nodes that are created when you scale out a cluster automatically receive `/24` address spaces from the same CIDR. Azure CNI assigns IPs to pods from this `/24` space.

articles/aks/concepts-sustainable-software-engineering.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Concepts - Sustainable software engineering in Azure Kubernetes Services
33
description: Learn about sustainable software engineering in Azure Kubernetes Service (AKS).
44
services: container-service
55
ms.topic: conceptual
6-
ms.date: 10/21/2022
6+
ms.date: 10/25/2022
77
---
88

99
# Sustainable software engineering practices in Azure Kubernetes Service (AKS)
@@ -61,7 +61,7 @@ We recommend careful consideration of these design patterns for building a susta
6161
| [Enable cluster and node auto-updates](#enable-cluster-and-node-auto-updates) | | ✔️ |
6262
| [Install supported add-ons and extensions](#install-supported-add-ons-and-extensions) | ✔️ | ✔️ |
6363
| [Containerize your workload where applicable](#containerize-your-workload-where-applicable) | ✔️ | |
64-
| [Use spot node pools when possible](#use-spot-node-pools-when-possible) | | ✔️ |
64+
| [Use energy efficient hardware](#use-energy-efficient-hardware) | | ✔️ |
6565
| [Match the scalability needs and utilize auto-scaling and bursting capabilities](#match-the-scalability-needs-and-utilize-auto-scaling-and-bursting-capabilities) | | ✔️ |
6666
| [Turn off workloads and node pools outside of business hours](#turn-off-workloads-and-node-pools-outside-of-business-hours) | ✔️ | ✔️ |
6767
| [Delete unused resources](#delete-unused-resources) | ✔️ | ✔️ |
@@ -120,11 +120,11 @@ Containers allow for reducing unnecessary resource allocation and making better
120120

121121
* Use [Draft](/azure/aks/draft) to simplify application containerization by generating Dockerfiles and Kubernetes manifests.
122122

123-
### Use spot node pools when possible
123+
### Use energy efficient hardware
124124

125-
Spot nodes use Spot VMs and are great for workloads that can handle interruptions, early terminations, or evictions such as batch processing jobs and development and testing environments.
125+
Ampere's Cloud Native Processors are uniquely designed to meet both the high performance and power efficiency needs of the cloud.
126126

127-
* Use [spot node pools](/azure/aks/spot-node-pool) to take advantage of unused capacity in Azure at a significant cost saving for a more sustainable platform design for your [interruptible workloads](/azure/architecture/guide/spot/spot-eviction).
127+
* Evaluate if nodes with [Ampere Altra Arm–based processors](https://azure.microsoft.com/blog/azure-virtual-machines-with-ampere-altra-arm-based-processors-generally-available/) are a good option for your workloads.
128128

129129
### Match the scalability needs and utilize auto-scaling and bursting capabilities
130130

articles/aks/configure-kube-proxy.md

Lines changed: 132 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,132 @@
1+
---
2+
title: Configure kube-proxy (iptables/IPVS) (preview)
3+
titleSuffix: Azure Kubernetes Service
4+
description: Learn how to configure kube-proxy to utilize different load balancing configurations with Azure Kubernetes Service (AKS).
5+
services: container-service
6+
ms.topic: article
7+
ms.date: 10/25/2022
8+
ms.author: pahealy
9+
author: phealy
10+
11+
#Customer intent: As a cluster operator, I want to utilize a different kube-proxy configuration.
12+
---
13+
14+
# Configure `kube-proxy` in Azure Kubernetes Service (AKS) (preview)
15+
16+
`kube-proxy` is a component of Kubernetes that handles routing traffic for services within the cluster. There are two backends available for Layer 3/4 load balancing in upstream `kube-proxy` - iptables and IPVS.
17+
18+
- iptables is the default backend utilized in the majority of Kubernetes clusters. It is simple and well supported, but is not as efficient or intelligent as IPVS.
19+
- IPVS utilizes the Linux Virtual Server, a layer 3/4 load balancer built into the Linux kernel. IPVS provides a number of advantages over the default iptables configuration, including state awareness, connection tracking, and more intelligent load balancing.
20+
21+
The AKS managed `kube-proxy` DaemonSet can also be disabled entirely if that is desired to support [bring-your-own CNI][aks-byo-cni].
22+
23+
[!INCLUDE [preview features callout](./includes/preview/preview-callout.md)]
24+
25+
## Prerequisites
26+
27+
* Azure CLI with aks-preview extension 0.5.105 or later.
28+
* If using ARM or the REST API, the AKS API version must be 2022-08-02-preview or later.
29+
30+
### Install the aks-preview CLI extension
31+
32+
```azurecli-interactive
33+
# Install the aks-preview extension
34+
az extension add --name aks-preview
35+
36+
# Update the extension to make sure you have the latest version installed
37+
az extension update --name aks-preview
38+
```
39+
40+
### Register the `KubeProxyConfigurationPreview` preview feature
41+
42+
To create an AKS cluster with custom `kube-proxy` configuration, you must enable the `KubeProxyConfigurationPreview` feature flag on your subscription.
43+
44+
Register the `KubeProxyConfigurationPreview` feature flag by using the `az feature register` command, as shown in the following example:
45+
46+
```azurecli-interactive
47+
az feature register --namespace "Microsoft.ContainerService" --name "KubeProxyConfigurationPreview"
48+
```
49+
50+
It takes a few minutes for the status to show *Registered*. Verify the registration status by using the `az feature list` command:
51+
52+
```azurecli-interactive
53+
az feature list -o table --query "[?contains(name, 'Microsoft.ContainerService/KubeProxyConfigurationPreview')].{Name:name,State:properties.state}"
54+
```
55+
56+
When the feature has been registered, refresh the registration of the *Microsoft.ContainerService* resource provider by using the `az provider register` command:
57+
58+
```azurecli-interactive
59+
az provider register --namespace Microsoft.ContainerService
60+
```
61+
62+
## Configurable options
63+
64+
The full `kube-proxy` configuration structure can be found in the [AKS Cluster Schema][aks-schema-kubeproxyconfig].
65+
66+
- `enabled` - whether or not to deploy the `kube-proxy` DaemonSet. Defaults to true.
67+
- `mode` - can be set to `IPTABLES` or `IPVS`. Defaults to `IPTABLES`.
68+
- `ipvsConfig` - if `mode` is `IPVS`, this object contains IPVS-specific configuration properties.
69+
- `scheduler` - which connection scheduler to utilize. Supported values:
70+
- `LeastConnections` - sends connections to the backend pod with the fewest connections
71+
- `RoundRobin` - distributes connections evenly between backend pods
72+
- `tcpFinTimeoutSeconds` - the value used for timeout after a FIN has been received in a TCP session
73+
- `tcpTimeoutSeconds` - the value used for timeout length for idle TCP sessions
74+
- `udpTimeoutSeconds` - the value used for timeout length for idle UDP sessions
75+
76+
> [!NOTE]
77+
> IPVS load balancing operates in each node independently and is still only aware of connections flowing through the local node. This means that while `LeastConnections` results in more even load under higher number of connections, when low numbers of connections (# connects < 2 * node count) occur traffic may still be relatively unbalanced.
78+
79+
## Utilize `kube-proxy` configuration in a new or existing AKS cluster using Azure CLI
80+
81+
`kube-proxy` configuration is a cluster-wide setting. No action is needed to update your services.
82+
83+
>[!WARNING]
84+
> Changing the kube-proxy configuration may cause a slight interruption in cluster service traffic flow.
85+
86+
To begin, create a JSON configuration file with the desired settings:
87+
88+
### Create a configuration file
89+
90+
```json
91+
{
92+
"enabled": true,
93+
"mode": "IPVS",
94+
"ipvsConfig": {
95+
"scheduler": "LeastConnection",
96+
"TCPTimeoutSeconds": 900,
97+
"TCPFINTimeoutSeconds": 120,
98+
"UDPTimeoutSeconds": 300
99+
}
100+
}
101+
```
102+
103+
### Deploy a new cluster
104+
105+
Deploy your cluster using `az aks create` and pass in the configuration file:
106+
107+
```bash
108+
az aks create -g <resourceGroup> -n <clusterName> --kube-proxy-config kube-proxy.json
109+
```
110+
111+
### Update an existing cluster
112+
113+
Configure your cluster using `az aks update` and pass in the configuration file:
114+
115+
```bash
116+
az aks update -g <resourceGroup> -n <clusterName> --kube-proxy-config kube-proxy.json
117+
```
118+
119+
## Next steps
120+
121+
Learn more about utilizing the Standard Load Balancer for inbound traffic at the [AKS Standard Load Balancer documentation][load-balancer-standard.md].
122+
123+
Learn more about using Internal Load Balancer for Inbound traffic at the [AKS Internal Load Balancer documentation](internal-lb.md).
124+
125+
Learn more about Kubernetes services at the [Kubernetes services documentation][kubernetes-services].
126+
127+
<!-- LINKS - External -->
128+
[kubernetes-services]: https://kubernetes.io/docs/concepts/services-networking/service/
129+
[aks-schema-kubeproxyconfig]: /azure/templates/microsoft.containerservice/managedclusters?pivots=deployment-language-bicep#containerservicenetworkprofilekubeproxyconfig
130+
131+
<!-- LINKS - Internal -->
132+
[aks-byo-cni]: use-byo-cni.md

articles/automation/automation-config-aws-account.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,28 +4,31 @@ description: This article tells how to authenticate runbooks with Amazon Web Ser
44
keywords: aws authentication, configure aws
55
services: automation
66
ms.subservice: process-automation
7-
ms.date: 04/23/2020
7+
ms.date: 10/28/2022
8+
ms.custom: engagement-fy23
89
ms.topic: conceptual
910
---
1011
# Authenticate runbooks with Amazon Web Services
1112

12-
Automating common tasks with resources in Amazon Web Services (AWS) can be accomplished with Automation runbooks in Azure. You can automate many tasks in AWS using Automation runbooks just like you can with resources in Azure. For authentication, you must have an Azure subscription.
13+
You can automate common tasks with resources in Amazon Web Services (AWS) using Automation runbooks in Azure. You can automate many tasks in AWS using Automation runbooks similar to the resources in Azure. Ensure that you have the Azure subscription to authenticate.
1314

1415
## Obtain AWS subscription and credentials
1516

16-
To authenticate with AWS, you must obtain an AWS subscription and specify a set of AWS credentials to authenticate your runbooks running from Azure Automation. Specific credentials required are the AWS Access Key and Secret Key. See [Using AWS Credentials](https://docs.aws.amazon.com/powershell/latest/userguide/specifying-your-aws-credentials.html).
17+
Ensure that you obtain an AWS subscription and specify a set of AWS credentials to authenticate your runbooks running from Azure Automation. Specific credentials required are the AWS Access Key and Secret Key. See [Using AWS Credentials](https://docs.aws.amazon.com/powershell/latest/userguide/specifying-your-aws-credentials.html).
1718

1819
## Configure Automation account
1920

2021
You can use an existing Automation account to authenticate with AWS. Alternatively, you can dedicate an account for runbooks targeting AWS resources. In this case, create a new [Automation account](automation-create-standalone-account.md).
2122

2223
## Store AWS credentials
2324

24-
You must store the AWS credentials as assets in Azure Automation. See [Managing Access Keys for your AWS Account](https://docs.aws.amazon.com/general/latest/gr/managing-aws-access-keys.html) for instructions on creating the Access Key and the Secret Key. When the keys are available, copy the Access Key ID and the Secret Key ID in a safe place. You can download your key file to store it somewhere safe.
25+
You must store the AWS credentials as assets in Azure Automation. See [Managing Access Keys for your AWS Account](https://docs.aws.amazon.com/general/latest/gr/managing-aws-access-keys.html) for instructions on how to create the Access Key and the Secret Key. When the keys are available, copy the Access Key ID and the Secret Key ID in a safe place. You can download your key file to store it safely.
2526

26-
## Create credential asset
27+
### Create credential asset
2728

28-
After you have created and copied your AWS security keys, you must create a Credential asset with the Automation account. The asset allows you to securely store the AWS keys and reference them in your runbooks. See [Create a new credential asset with the Azure portal](shared-resources/credentials.md#create-a-new-credential-asset-with-the-azure-portal). Enter the following AWS information in the fields provided:
29+
After you have created and copied your AWS security keys, you must create a Credential asset with the Automation account. The asset allows you to securely store the AWS keys and reference them in your runbooks. See [Create a new credential asset with the Azure portal](shared-resources/credentials.md#create-a-new-credential-asset-with-the-azure-portal).
30+
31+
Enter the following AWS information in the fields provided:
2932

3033
* **Name** - **AWScred**, or an appropriate value following your naming standards
3134
* **User name** - Your access ID

articles/automation/automation-dsc-cd-chocolatey.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,9 @@ ms.custom: references_regions, devx-track-azurepowershell
1010

1111
# Set up continuous deployment with Chocolatey
1212

13+
> [!NOTE]
14+
> Before you enable Automation State Configuration, we would like you to know that a newer version of DSC is now generally available, managed by a feature of Azure Policy named [guest configuration](../governance/machine-configuration/overview.md). The guest configuration service combines features of DSC Extension, Azure Automation State Configuration, and the most commonly requested features from customer feedback. Guest configuration also includes hybrid machine support through [Arc-enabled servers](../azure-arc/servers/overview.md).
15+
1316
In a DevOps world, there are many tools to assist with various points in the continuous integration
1417
pipeline. Azure Automation [State Configuration](automation-dsc-overview.md) is a welcome new addition to the options that DevOps teams can employ.
1518

0 commit comments

Comments
 (0)