Skip to content

Commit 44abe29

Browse files
committed
fix conflicts
2 parents 39c990c + c95a405 commit 44abe29

File tree

139 files changed

+841
-678
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

139 files changed

+841
-678
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43303,6 +43303,11 @@
4330343303
"source_path_from_root": "/articles/virtual-network/nat-gateway/tutorial-create-nat-gateway-cli.md",
4330443304
"redirect_url": "/azure/virtual-network/nat-gateway/quickstart-create-nat-gateway-cli",
4330543305
"redirect_document_id": true
43306+
},
43307+
{
43308+
"source_path_from_root": "/articles/aks/web-app-routing.md",
43309+
"redirect_url": "/azure/aks/intro-kubernetes",
43310+
"redirect_document_id":false
4330643311
}
4330743312
]
4330843313
}

articles/active-directory/hybrid/how-to-connect-fed-group-claims.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -252,12 +252,12 @@ Emit group names to be returned in `NetbiosDomain\sAMAccountName` format as the
252252
"optionalClaims": {
253253
"saml2Token": [{
254254
"name": "groups",
255-
"additionalProperties": ["netbios_name_and_sam_account_name", "emit_as_roles"]
255+
"additionalProperties": ["netbios_domain_and_sam_account_name", "emit_as_roles"]
256256
}],
257257

258258
"idToken": [{
259259
"name": "groups",
260-
"additionalProperties": ["netbios_name_and_sam_account_name", "emit_as_roles"]
260+
"additionalProperties": ["netbios_domain_and_sam_account_name", "emit_as_roles"]
261261
}]
262262
}
263263
```
@@ -266,4 +266,4 @@ Emit group names to be returned in `NetbiosDomain\sAMAccountName` format as the
266266

267267
- [Add authorization using groups & group claims to an ASP.NET Core web app (code sample)](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/blob/master/5-WebApp-AuthZ/5-2-Groups/README.md)
268268
- [Assign a user or group to an enterprise app](../../active-directory/manage-apps/assign-user-or-group-access-portal.md)
269-
- [Configure role claims](../../active-directory/develop/active-directory-enterprise-app-role-management.md)
269+
- [Configure role claims](../../active-directory/develop/active-directory-enterprise-app-role-management.md)

articles/aks/TOC.yml

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -181,7 +181,7 @@
181181
href: upgrade-cluster.md
182182
- name: Use Uptime SLA
183183
href: uptime-sla.md
184-
- name: Use Draft
184+
- name: Use Draft (preview)
185185
href: draft.md
186186
- name: Use proximity placement groups
187187
href: reduce-latency-ppg.md
@@ -467,8 +467,6 @@
467467
href: open-service-mesh-uninstall-add-on.md
468468
- name: Kubernetes Event-driven Autoscaler add-on (preview)
469469
href: keda.md
470-
- name: Web Application Routing (preview)
471-
href: web-app-routing.md
472470
- name: Use cluster extensions
473471
href: cluster-extensions.md
474472
- name: DevOps

articles/aks/draft.md

Lines changed: 0 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -104,22 +104,6 @@ You can also run the command on a specific directory using the `--destination` f
104104
az aks draft up --destination /Workspaces/ContosoAir
105105
```
106106

107-
## Use Web Application Routing with Draft to make your application accessible over the internet
108-
109-
[Web Application Routing][web-app-routing] is the easiest way to get your web application up and running in Kubernetes securely, removing the complexity of ingress controllers and certificate and DNS management while offering configuration for enterprises looking to bring their own. Web Application Routing offers a managed ingress controller based on nginx that you can use without restrictions and integrates out of the box with Open Service Mesh to secure intra-cluster communications.
110-
111-
To set up Draft with Web Application Routing, use `az aks draft update` and pass in the DNS name and Azure Key Vault-stored certificate when prompted:
112-
113-
```azure-cli-interactive
114-
az aks draft update
115-
```
116-
117-
You can also run the command on a specific directory using the `--destination` flag:
118-
119-
```azure-cli-interactive
120-
az aks draft update --destination /Workspaces/ContosoAir
121-
```
122-
123107
## Delete the extension
124108

125109
To delete the extension and remove Draft from your AKS cluster, you can use the following command:

articles/aks/integrations.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,6 @@ The below table shows the available add-ons.
2626
| ingress-appgw | Use Application Gateway Ingress Controller with your AKS cluster. | [What is Application Gateway Ingress Controller?][agic] |
2727
| open-service-mesh | Use Open Service Mesh with your AKS cluster. | [Open Service Mesh AKS add-on][osm] |
2828
| azure-keyvault-secrets-provider | Use Azure Keyvault Secrets Provider addon.| [Use the Azure Key Vault Provider for Secrets Store CSI Driver in an AKS cluster][keyvault-secret-provider] |
29-
| web_application_routing | Use a managed NGINX ingress Controller with your AKS cluster.| [Web Application Routing Overview][web-app-routing] |
30-
3129

3230
## Extensions
3331

@@ -88,4 +86,3 @@ The below table shows a few examples of open-source and third-party integrations
8886
[spark-kubernetes]: https://spark.apache.org/docs/latest/running-on-kubernetes.html
8987
[dapr-overview]: ./dapr.md
9088
[gitops-overview]: ../azure-arc/kubernetes/conceptual-gitops-flux2.md
91-
[web-app-routing]: web-app-routing.md

articles/aks/keda.md

Lines changed: 83 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: container-service
55
author: jahabibi
66
ms.topic: article
77
ms.custom: event-tier1-build-2022
8-
ms.date: 05/13/2021
8+
ms.date: 05/24/2021
99
ms.author: jahabibi
1010
---
1111

@@ -26,23 +26,42 @@ The KEDA add-on makes it even easier by deploying a managed KEDA installation, p
2626

2727
## Prerequisites
2828

29+
> [!NOTE]
30+
> KEDA is currently only available in the `westcentralus` region.
31+
2932
- An Azure subscription. If you don't have an Azure subscription, you can create a [free account](https://azure.microsoft.com/free).
3033
- [Azure CLI installed](/cli/azure/install-azure-cli).
3134

32-
## Deploy the KEDA add-on with Azure CLI
33-
34-
The KEDA add-on can be enabled with the Azure CLI when deploying an AKS cluster.
35+
### Register the `AKS-KedaPreview` feature flag
3536

36-
To do so, use the [az aks create][az-aks-create] command with the `--enable-keda` argument.
37+
To use the KEDA, you must enable the `AKS-KedaPreview` feature flag on your subscription.
3738

3839
```azurecli
39-
az aks create --resource-group MyResourceGroup --name MyAKSCluster --enable-keda
40+
az feature register --name AKS-KedaPreview --namespace Microsoft.ContainerService
41+
```
42+
43+
You can check on the registration status by using the `az feature list` command:
44+
45+
```azurecli-interactive
46+
az feature list -o table --query "[?contains(name, 'Microsoft.ContainerService/AKS-KedaPreview')].{Name:name,State:properties.state}"
47+
```
48+
49+
When ready, refresh the registration of the *Microsoft.ContainerService* resource provider by using the `az provider register` command:
50+
51+
```azurecli-interactive
52+
az provider register --namespace Microsoft.ContainerService
4053
```
4154

42-
Additionally, KEDA can be deployed to an existing cluster via the [az aks update][az aks update] command.
55+
## Deploy the KEDA add-on with Azure Resource Manager (ARM) templates
4356

44-
```azure cli
45-
az aks update --resource-group MyResourceGroup --name MyAKSCluster --enable-keda
57+
The KEDA add-on can be enabled by deploying an AKS cluster with an Azure Resource Manager template and specifying the `workloadAutoScalerProfile` field:
58+
59+
```json
60+
"workloadAutoScalerProfile": {
61+
"keda": {
62+
"enabled": true
63+
}
64+
}
4665
```
4766

4867
## Connect to your AKS cluster
@@ -61,23 +80,72 @@ To configure `kubectl` to connect to your Kubernetes cluster, use the [az aks ge
6180
az aks get-credentials --resource-group MyResourceGroup --name MyAKSCluster
6281
```
6382

83+
## Example deployment
84+
85+
The following snippet is a sample deployment that creates a cluster with KEDA enabled with a single node pool comprised of three `DS2_v5` nodes.
86+
87+
```json
88+
{
89+
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
90+
"contentVersion": "1.0.0.0",
91+
"resources": [
92+
{
93+
"apiVersion": "2022-05-02-preview",
94+
"dependsOn": [],
95+
"type": "Microsoft.ContainerService/managedClusters",
96+
"location": "westcentralus",
97+
"name": "myAKSCluster",
98+
"properties": {
99+
"kubernetesVersion": "1.23.5",
100+
"enableRBAC": true,
101+
"dnsPrefix": "myAKSCluster",
102+
"agentPoolProfiles": [
103+
{
104+
"name": "agentpool",
105+
"osDiskSizeGB": 200,
106+
"count": 3,
107+
"enableAutoScaling": false,
108+
"vmSize": "Standard_D2S_v5",
109+
"osType": "Linux",
110+
"storageProfile": "ManagedDisks",
111+
"type": "VirtualMachineScaleSets",
112+
"mode": "System",
113+
"maxPods": 110,
114+
"availabilityZones": [],
115+
"nodeTaints": [],
116+
"enableNodePublicIP": false
117+
}
118+
],
119+
"networkProfile": {
120+
"loadBalancerSku": "standard",
121+
"networkPlugin": "kubenet"
122+
},
123+
"workloadAutoScalerProfile": {
124+
"keda": {
125+
"enabled": true
126+
}
127+
}
128+
},
129+
"identity": {
130+
"type": "SystemAssigned"
131+
}
132+
}
133+
]
134+
}
135+
```
136+
64137
## Use KEDA
138+
65139
KEDA scaling will only work once a custom resource definition has been defined (CRD). To learn more about KEDA CRDs, follow the official [KEDA documentation][keda-scalers] to define your scaler.
66140

67141
## Clean Up
68-
To remove KEDA, utilize the `--disable-keda` flag.
69-
70-
```azurecli
71-
az aks update --resource-group MyResourceGroup --name MyAKSCluster --disable-keda
72-
```
73142

74143
To remove the resource group, and all related resources, use the [az group delete][az-group-delete] command:
75144

76145
```azurecli
77146
az group delete --name MyResourceGroup
78147
```
79148

80-
81149
<!-- LINKS - internal -->
82150
[az-aks-create]: /cli/azure/aks#az-aks-create
83151
[az aks install-cli]: /cli/azure/aks#az-aks-install-cli

0 commit comments

Comments
 (0)