You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Deprecation note updates for AKS-Engine and Helm-Model add-on
-Removed AKS-Engine from intro & changed intro note to callout deprecation
-Removed comment that AKS custom policy is preview
-Moved Helm & AKS-Engine deprecation notes below their respective headers
> The add-ons for AKS Engine and Arc enabled Kubernetes are in **preview**. Azure Policy for
32
-
> Kubernetes only supports Linux node pools and built-in policy definitions (custom policy
33
-
> definitions is a _public preview_ feature). Built-in policy definitions are in the **Kubernetes**
34
-
> category. The limited preview policy definitions with **EnforceOPAConstraint** and
35
-
> **EnforceRegoPolicy** effect and the related **Kubernetes Service** category are _deprecated_.
36
-
> Instead, use the effects _audit_ and _deny_ with Resource Provider mode
37
-
> `Microsoft.Kubernetes.Data`.
30
+
> The Azure Policy Add-on Helm model and the add-on for AKS Engine have been _deprecated_. Instructions can be found below for [removal of those add-ons](#remove-the-add-on). The Azure Policy Extension for Azure Arc enabled Kubernetes is in _preview_.
38
31
39
32
## Overview
40
33
@@ -370,9 +363,6 @@ role-based access control (Azure RBAC) policy assignment operations. The Azure b
370
363
**Resource Policy Contributor** and **Owner** have these operations. To learn more, see
371
364
[Azure RBAC permissions in Azure Policy](../overview.md#azure-rbac-permissions-in-azure-policy).
372
365
373
-
> [!NOTE]
374
-
> Custom policy definitions is a _public preview_ feature.
375
-
376
366
Find the built-in policy definitions for managing your cluster using the Azure portal with the
377
367
following steps. If using a custom policy definition, search for it by name or the category that
378
368
you created it with.
@@ -392,8 +382,7 @@ you created it with.
392
382
393
383
> [!NOTE]
394
384
> When assigning the Azure Policy for Kubernetes definition, the **Scope** must include the
395
-
> cluster resource. For an AKS Engine cluster, the **Scope** must be the resource group of the
396
-
> cluster.
385
+
> cluster resource.
397
386
398
387
1. Give the policy assignment a **Name** and **Description** that you can use to identify it easily.
399
388
@@ -662,23 +651,23 @@ To remove the Azure Policy Add-on from your AKS cluster, use either the Azure po
662
651
az aks disable-addons --addons azure-policy --name MyAKSCluster --resource-group MyResourceGroup
663
652
```
664
653
654
+
### Remove the add-on from Azure Arc enabled Kubernetes
655
+
665
656
> [!NOTE]
666
657
> Azure Policy Add-on Helm model is now deprecated. Please opt for the [Azure Policy Extension for Azure Arc enabled Kubernetes](#install-azure-policy-extension-for-azure-arc-enabled-kubernetes) instead.
667
658
668
-
### Remove the add-on from Azure Arc enabled Kubernetes
669
-
670
659
To remove the Azure Policy Add-on and Gatekeeper from your Azure Arc enabled Kubernetes cluster, run
671
660
the following Helm command:
672
661
673
662
```bash
674
663
helm uninstall azure-policy-addon
675
664
```
676
665
666
+
### Remove the add-on from AKS Engine
667
+
677
668
> [!NOTE]
678
669
> The AKS Engine product is now deprecated for Azure public cloud customers. Please consider using [Azure Kubernetes Service (AKS)](https://azure.microsoft.com/services/kubernetes-service/) for managed Kubernetes or [Cluster API Provider Azure](https://github.com/kubernetes-sigs/cluster-api-provider-azure) for self-managed Kubernetes. There are no new features planned; this project will only be updated for CVEs & similar, with Kubernetes 1.24 as the final version to receive updates.
679
670
680
-
### Remove the add-on from AKS Engine
681
-
682
671
To remove the Azure Policy Add-on and Gatekeeper from your AKS Engine cluster, use the method that
0 commit comments