Skip to content

Commit 54a9945

Browse files
Merge pull request #281257 from apwestgarth/acarelnotesjul24
Added notes on Extension 1.37.1
2 parents 64d0f76 + f909a02 commit 54a9945

File tree

1 file changed

+18
-14
lines changed

1 file changed

+18
-14
lines changed

articles/container-apps/azure-arc-overview.md

Lines changed: 18 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: container-apps
55
author: craigshoemaker
66
ms.service: container-apps
77
ms.topic: conceptual
8-
ms.date: 04/22/2024
8+
ms.date: 07/18/2024
99
ms.author: cshoe
1010
---
1111

@@ -20,7 +20,7 @@ Running in an Azure Arc-enabled Kubernetes cluster allows:
2020

2121
Learn to set up your Kubernetes cluster for Container Apps, via [Set up an Azure Arc-enabled Kubernetes cluster to run Azure Container Apps](azure-arc-enable-cluster.md)
2222

23-
As you configure your cluster, you'll carry out these actions:
23+
As you configure your cluster, you carry out these actions:
2424

2525
- **The connected cluster**, which is an Azure projection of your Kubernetes infrastructure. For more information, see [What is Azure Arc-enabled Kubernetes?](../azure-arc/kubernetes/overview.md).
2626

@@ -40,7 +40,7 @@ The following public preview limitations apply to Azure Container Apps on Azure
4040
| Cluster networking requirement | Must support [LoadBalancer](https://kubernetes.io/docs/concepts/services-networking/service/#loadbalancer) service type |
4141
| Feature: Managed identities | [Not available](#are-managed-identities-supported) |
4242
| Feature: Pull images from ACR with managed identity | Not available (depends on managed identities) |
43-
| Logs | Log Analytics must be configured with cluster extension; not per-site |
43+
| Logs | Log Analytics must be configured with cluster extension; not per-application |
4444

4545
## Resources created by the Container Apps extension
4646

@@ -55,12 +55,12 @@ The following table describes the role of each revision created for you:
5555
| `<extensionName>-k8se-activator` | Used as part of the scaling pipeline | 2 | 100 millicpu | 500 MB | ReplicaSet |
5656
| `<extensionName>-k8se-billing` | Billing record generation - Azure Container Apps on Azure Arc enabled Kubernetes is Free of Charge during preview | 3 | 100 millicpu | 100 MB | ReplicaSet |
5757
| `<extensionName>-k8se-containerapp-controller` | The core operator pod that creates resources on the cluster and maintains the state of components. | 2 | 100 millicpu | 1 GB | ReplicaSet |
58-
| `<extensionName>-k8se-envoy` | A front-end proxy layer for all data-plane http requests. It routes the inbound traffic to the correct apps. | 3 | 1 Core | 1536 MB | ReplicaSet |
58+
| `<extensionName>-k8se-envoy` | A front-end proxy layer for all data-plane http requests. It routes the inbound traffic to the correct apps. | 3 | 1 Core | 1,536 MB | ReplicaSet |
5959
| `<extensionName>-k8se-envoy-controller` | Operator, which generates Envoy configuration | 2 | 200 millicpu | 500 MB | ReplicaSet |
6060
| `<extensionName>-k8se-event-processor` | An alternative routing destination to help with apps that have scaled to zero while the system gets the first instance available. | 2 | 100 millicpu | 500 MB | ReplicaSet |
6161
| `<extensionName>-k8se-http-scaler` | Monitors inbound request volume in order to provide scaling information to [KEDA](https://keda.sh). | 1 | 100 millicpu | 500 MB | ReplicaSet |
6262
| `<extensionName>-k8se-keda-cosmosdb-scaler` | KEDA Cosmos DB Scaler | 1 | 10 m | 128 MB | ReplicaSet |
63-
| `<extensionName>-k8se-keda-metrics-apiserver` | KEDA Metrics Server | 1 | 1 Core | 1000 MB | ReplicaSet |
63+
| `<extensionName>-k8se-keda-metrics-apiserver` | KEDA Metrics Server | 1 | 1 Core | 1,000 MB | ReplicaSet |
6464
| `<extensionName>-k8se-keda-operator` | Scales workloads in and out from 0/1 to N instances | 1 | 100 millicpu | 500 MB | ReplicaSet |
6565
| `<extensionName>-k8se-log-processor` | Gathers logs from apps and other components and sends them to Log Analytics. | 2 | 200 millicpu | 500 MB | DaemonSet |
6666
| `<extensionName>-k8se-mdm` | Metrics and Logs Agent | 2 | 500 millicpu | 500 MB | ReplicaSet |
@@ -77,7 +77,7 @@ The following table describes the role of each revision created for you:
7777
- [Are there any scaling limits?](#are-there-any-scaling-limits)
7878
- [What logs are collected?](#what-logs-are-collected)
7979
- [What do I do if I see a provider registration error?](#what-do-i-do-if-i-see-a-provider-registration-error)
80-
- [Can I deploy the Container Apps extension on an ARM64 based cluster?](#can-i-deploy-the-container-apps-extension-on-an-arm64-based-cluster)
80+
- [Can I deploy the Container Apps extension on an Arm64 based cluster?](#can-i-deploy-the-container-apps-extension-on-an-arm64-based-cluster)
8181

8282
### How much does it cost?
8383

@@ -101,15 +101,15 @@ Logs for both system components and your applications are written to standard ou
101101

102102
Both log types can be collected for analysis using standard Kubernetes tools. You can also configure the application environment cluster extension with a [Log Analytics workspace](../azure-monitor/logs/log-analytics-overview.md), and it sends all logs to that workspace.
103103

104-
By default, logs from system components are sent to the Azure team. Application logs aren't sent. You can prevent these logs from being transferred by setting `logProcessor.enabled=false` as an extension configuration setting. This configuration setting will also disable forwarding of application to your Log Analytics workspace. Disabling the log processor might affect the time needed for any support cases, and you'll be asked to collect logs from standard output through some other means.
104+
By default, logs from system components are sent to the Azure team. Application logs aren't sent. You can prevent these logs from being transferred by setting `logProcessor.enabled=false` as an extension configuration setting. This configuration setting disables forwarding of application to your Log Analytics workspace. Disabling the log processor might affect the time needed for any support cases, and you'll be asked to collect logs from standard output through some other means.
105105

106106
### What do I do if I see a provider registration error?
107107

108108
As you create an Azure Container Apps connected environment resource, some subscriptions might see the "No registered resource provider found" error. The error details might include a set of locations and API versions that are considered valid. If this error message is returned, the subscription must be re-registered with the `Microsoft.App` provider. Re-registering the provider has no effect on existing applications or APIs. To re-register, use the Azure CLI to run `az provider register --namespace Microsoft.App --wait`. Then reattempt the connected environment command.
109109

110-
### Can I deploy the Container Apps extension on an ARM64 based cluster?
110+
### Can I deploy the Container Apps extension on an Arm64 based cluster?
111111

112-
ARM64 based clusters aren't supported at this time.
112+
Arm64 based clusters aren't supported at this time.
113113

114114
## Extension Release Notes
115115

@@ -180,16 +180,16 @@ ARM64 based clusters aren't supported at this time.
180180
### Container Apps extension v1.30.6 (January 2024)
181181

182182
- Update KEDA to v2.12, Envoy SC image to v1.0.4, and Dapr image to v1.11.6
183-
- Added default response timeout for Envoy routes to 1800 seconds
183+
- Added default response timeout for Envoy routes to 1,800 seconds
184184
- Changed Fluent bit default log level to warn
185185
- Delay deletion of job pods to ensure log emission
186186
- Fixed issue for job pod deletion for failed job executions
187-
- Ensure jobs in suspended state also have failed pods deleted
187+
- Ensure jobs in suspended state have failed pods deleted
188188
- Update to not resolve HTTPOptions for TCP applications
189189
- Allow applications to listen on HTTP or HTTPS
190190
- Add ability to suspend jobs
191191
- Fixed issue where KEDA scaler was failing to create job after stopped job execution
192-
- Add startingDeadlineSeconds to Container App Job in case of cluster reboot
192+
- Add startingDeadlineSeconds to Container App Job if there's a cluster reboot
193193
- Removed heavy logging in Envoy access log server
194194
- Updated Monitoring Configuration version for Azure Container Apps on Azure Arc enabled Kubernetes
195195

@@ -202,12 +202,16 @@ ARM64 based clusters aren't supported at this time.
202202
- Export additional Envoy metrics
203203
- Truncate Envoy log to first 1,024 characters when log content failed to parse
204204
- Handle SIGTERM gracefully in local proxy
205-
- Allow ability to leverage different namespaces with KEDA
205+
- Allow ability to use different namespaces with KEDA
206206
- Validation added for scale rule name
207207
- Enabled revision GC by default
208208
- Enabled emission of metrics for sidecars
209209
- Added volumeMounts to job executions
210-
- Added validation to webhook endpoints for jobs
210+
- Added validation to webhook endpoints for jobs
211+
212+
### Container Apps extension v1.37.1 (July 2024)
213+
214+
- Update EasyAuth to support MISE
211215

212216
## Next steps
213217

0 commit comments

Comments
 (0)