You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/tutorial-kubernetes-deploy-cluster.md
+50-50Lines changed: 50 additions & 50 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,6 +82,56 @@ AZD Environments in a codespace automatically download all dependencies found in
82
82
83
83
---
84
84
85
+
## Create an AKS cluster
86
+
87
+
AKS clusters can use [Kubernetes role-based access control (Kubernetes RBAC)][k8s-rbac], which allows you to define access to resources based on roles assigned to users. Permissions are combined when users are assigned multiple roles. Permissions can be scoped to either a single namespace or across the whole cluster. For more information, see [Control access to cluster resources using Kubernetes RBAC and Microsoft Entra ID in AKS][aks-k8s-rbac].
88
+
89
+
For information about AKS resource limits and region availability, see [Quotas, virtual machine size restrictions, and region availability in AKS][quotas-skus-regions].
90
+
91
+
> [!NOTE]
92
+
> To ensure your cluster operates reliably, you should run at least two nodes.
93
+
94
+
### [Azure CLI](#tab/azure-cli)
95
+
96
+
To allow an AKS cluster to interact with other Azure resources, the Azure platform automatically creates a cluster identity. In this example, the cluster identity is [granted the right to pull images][container-registry-integration] from the ACR instance you created in the previous tutorial. To execute the command successfully, you need to have an **Owner** or **Azure account administrator** role in your Azure subscription.
97
+
98
+
* Create an AKS cluster using the [`az aks create`][az aks create] command. The following example creates a cluster named *myAKSCluster* in the resource group named *myResourceGroup*. This resource group was created in the [previous tutorial][aks-tutorial-prepare-acr] in the *eastus* region.
99
+
100
+
```azurecli-interactive
101
+
az aks create \
102
+
--resource-group myResourceGroup \
103
+
--name myAKSCluster \
104
+
--node-count 2 \
105
+
--generate-ssh-keys \
106
+
--attach-acr <acrName>
107
+
```
108
+
109
+
> [!NOTE]
110
+
> If you already generated SSH keys, you may encounter an error similar to `linuxProfile.ssh.publicKeys.keyData is invalid`. To proceed, retry the command without the `--generate-ssh-keys` parameter.
111
+
112
+
To avoid needing an **Owner** or **Azure account administrator** role, you can also manually configure a service principal to pull images from ACR. For more information, see [ACR authentication with service principals](../container-registry/container-registry-auth-service-principal.md) or [Authenticate from Kubernetes with a pull secret](../container-registry/container-registry-auth-kubernetes.md). Alternatively, you can use a [managed identity](use-managed-identity.md) instead of a service principal for easier management.
113
+
114
+
### [Azure PowerShell](#tab/azure-powershell)
115
+
116
+
To allow an AKS cluster to interact with other Azure resources, the Azure platform automatically creates a cluster identity. In this example, the cluster identity is [granted the right to pull images][container-registry-integration] from the ACR instance you created in the previous tutorial. To execute the command successfully, you need to have an **Owner** or **Azure account administrator** role in your Azure subscription.
117
+
118
+
* Create an AKS cluster using the [`New-AzAksCluster`][new-azakscluster] cmdlet. The following example creates a cluster named *myAKSCluster* in the resource group named *myResourceGroup*. This resource group was created in the [previous tutorial][aks-tutorial-prepare-acr] in the *eastus* region.
> If you already generated SSH keys, you may encounter an error similar to `linuxProfile.ssh.publicKeys.keyData is invalid`. To proceed, retry the command without the `-GenerateSshKey` parameter.
126
+
127
+
To avoid needing an **Owner** or **Azure account administrator** role, you can also manually configure a service principal to pull images from ACR. For more information, see [ACR authentication with service principals](../container-registry/container-registry-auth-service-principal.md) or [Authenticate from Kubernetes with a pull secret](../container-registry/container-registry-auth-kubernetes.md). Alternatively, you can use a [managed identity](use-managed-identity.md) instead of a service principal for easier management.
128
+
129
+
### [Azure Developer CLI](#tab/azure-azd)
130
+
131
+
AZD packages the deployment of clusters with the application itself using `azd up`. This command is covered in the next tutorial.
132
+
133
+
---
134
+
85
135
## Connect to cluster using kubectl
86
136
87
137
### [Azure CLI](#tab/azure-cli)
@@ -158,56 +208,6 @@ Sign in to your Azure Account through AZD configures your credentials.
158
208
159
209
---
160
210
161
-
## Create an AKS cluster
162
-
163
-
AKS clusters can use [Kubernetes role-based access control (Kubernetes RBAC)][k8s-rbac], which allows you to define access to resources based on roles assigned to users. Permissions are combined when users are assigned multiple roles. Permissions can be scoped to either a single namespace or across the whole cluster. For more information, see [Control access to cluster resources using Kubernetes RBAC and Microsoft Entra ID in AKS][aks-k8s-rbac].
164
-
165
-
For information about AKS resource limits and region availability, see [Quotas, virtual machine size restrictions, and region availability in AKS][quotas-skus-regions].
166
-
167
-
> [!NOTE]
168
-
> To ensure your cluster operates reliably, you should run at least two nodes.
169
-
170
-
### [Azure CLI](#tab/azure-cli)
171
-
172
-
To allow an AKS cluster to interact with other Azure resources, the Azure platform automatically creates a cluster identity. In this example, the cluster identity is [granted the right to pull images][container-registry-integration] from the ACR instance you created in the previous tutorial. To execute the command successfully, you need to have an **Owner** or **Azure account administrator** role in your Azure subscription.
173
-
174
-
* Create an AKS cluster using the [`az aks create`][az aks create] command. The following example creates a cluster named *myAKSCluster* in the resource group named *myResourceGroup*. This resource group was created in the [previous tutorial][aks-tutorial-prepare-acr] in the *eastus* region.
175
-
176
-
```azurecli-interactive
177
-
az aks create \
178
-
--resource-group myResourceGroup \
179
-
--name myAKSCluster \
180
-
--node-count 2 \
181
-
--generate-ssh-keys \
182
-
--attach-acr <acrName>
183
-
```
184
-
185
-
> [!NOTE]
186
-
> If you already generated SSH keys, you may encounter an error similar to `linuxProfile.ssh.publicKeys.keyData is invalid`. To proceed, retry the command without the `--generate-ssh-keys` parameter.
187
-
188
-
To avoid needing an **Owner** or **Azure account administrator** role, you can also manually configure a service principal to pull images from ACR. For more information, see [ACR authentication with service principals](../container-registry/container-registry-auth-service-principal.md) or [Authenticate from Kubernetes with a pull secret](../container-registry/container-registry-auth-kubernetes.md). Alternatively, you can use a [managed identity](use-managed-identity.md) instead of a service principal for easier management.
189
-
190
-
### [Azure PowerShell](#tab/azure-powershell)
191
-
192
-
To allow an AKS cluster to interact with other Azure resources, the Azure platform automatically creates a cluster identity. In this example, the cluster identity is [granted the right to pull images][container-registry-integration] from the ACR instance you created in the previous tutorial. To execute the command successfully, you need to have an **Owner** or **Azure account administrator** role in your Azure subscription.
193
-
194
-
* Create an AKS cluster using the [`New-AzAksCluster`][new-azakscluster] cmdlet. The following example creates a cluster named *myAKSCluster* in the resource group named *myResourceGroup*. This resource group was created in the [previous tutorial][aks-tutorial-prepare-acr] in the *eastus* region.
> If you already generated SSH keys, you may encounter an error similar to `linuxProfile.ssh.publicKeys.keyData is invalid`. To proceed, retry the command without the `-GenerateSshKey` parameter.
202
-
203
-
To avoid needing an **Owner** or **Azure account administrator** role, you can also manually configure a service principal to pull images from ACR. For more information, see [ACR authentication with service principals](../container-registry/container-registry-auth-service-principal.md) or [Authenticate from Kubernetes with a pull secret](../container-registry/container-registry-auth-kubernetes.md). Alternatively, you can use a [managed identity](use-managed-identity.md) instead of a service principal for easier management.
204
-
205
-
### [Azure Developer CLI](#tab/azure-azd)
206
-
207
-
AZD packages the deployment of clusters with the application itself using `azd up`. This command is covered in the next tutorial.
208
-
209
-
---
210
-
211
211
## Next steps
212
212
213
213
In this tutorial, you deployed a Kubernetes cluster in AKS and configured `kubectl` to connect to the cluster. You learned how to:
Copy file name to clipboardExpand all lines: articles/automation/how-to/move-account.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -129,4 +129,7 @@ When the move is complete, verify that the capabilities listed below are enabled
129
129
130
130
## Next steps
131
131
132
+
133
+
To learn how to move Automation to a new region, see [Move Automation account to another region](../../operational-excellence/relocation-automation.md).
134
+
132
135
To learn about moving resources in Azure, see [Move resources in Azure](../../azure-resource-manager/management/move-support-resources.md).
Copy file name to clipboardExpand all lines: articles/azure-portal/azure-portal-add-remove-sort-favorites.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ In this example, we'll add **Cost Management + Billing** to the **Favorites** li
21
21
22
22
:::image type="content" source="media/azure-portal-add-remove-sort-favorites/azure-portal-favorites-new-all-services.png" alt-text="Screenshot showing All services in the Azure portal menu.":::
23
23
24
-
1. Enter the word "cost" in the **Filter services** field near the top of the **All services**page. Services that have "cost" in the title or that have "cost" as a keyword are shown.
24
+
1. Enter the word "cost" in the **Filter services** field near the top of the **All services**pane. Services that have "cost" in the title or that have "cost" as a keyword are shown.
25
25
26
26
:::image type="content" source="media/azure-portal-add-remove-sort-favorites/azure-portal-favorites-find-service.png" alt-text="Screenshot showing a search in All services in the Azure portal.":::
Copy file name to clipboardExpand all lines: articles/azure-portal/azure-portal-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,7 +44,7 @@ As noted earlier, you can [set your startup page to Dashboard](set-preferences.m
44
44
45
45
## Getting around the portal
46
46
47
-
The portal menu and page header are global elements that are always present in the Azure portal. These persistent features are the "shell" for the user interface associated with each individual service or feature. The header provides access to global controls. The configuration page (sometimes referred to as a "blade") for a resource or service may also have a resource menu specific to that area.
47
+
The portal menu and page header are global elements that are always present in the Azure portal. These persistent features are the "shell" for the user interface associated with each individual service or feature. The header provides access to global controls. The working pane for a resource or service may also have a resource menu specific to that area.
48
48
49
49
The figure below labels the basic elements of the Azure portal, each of which are described in the following table. In this example, the current focus is a virtual machine, but the same elements apply no matter what type of resource or service you're working with.
0 commit comments