Skip to content

Commit 68b8746

Browse files
authored
Update faq.md
Answer a common question customers have around the existence of the AKS Linux Extension.
1 parent 53e6f1b commit 68b8746

File tree

1 file changed

+18
-1
lines changed

1 file changed

+18
-1
lines changed

articles/aks/faq.md

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -307,7 +307,24 @@ AKS nodes run the "chrony" service, which pulls time from the localhost. Contai
307307
308308
## How are AKS addons updated?
309309
310-
Any patch, including security patches, is automatically applied to the AKS cluster. Anything bigger than a patch, like major or minor version changes (which can have breaking changes to your deployed objects), is updated when you update your cluster if a new release is available. You can find when a new release is available by visiting the [AKS release notes](https://github.com/Azure/AKS/releases).
310+
Any patch, including security patches, is automatically applied to the AKS cluster. Anything bigger than a patch, like major or minor version changes (which can have breaking changes to your deployed objects), is updated when you update your cluster if a new release is available. You can find when a new release is available by visiting the [AKS release notes](https://github.com/Azure/AKS/releases).
311+
312+
## What is the purpose of the AKS Linux Extension I see installed on my Linux VMSS instances?
313+
314+
The AKS Linux Extension is an Azure VM extension whose purpose is to install and configure monitoring tools on Kubernetes worker nodes. The extension is installed on all new and existing Linux nodes. It configures the following monitoring tools:
315+
316+
- [Node-exporter](https://github.com/prometheus/node_exporter): collects hardware telemetry from the virtual machine and makes it available via a metrics endpoint. These metrics are then able to be scraped by a monitoring tool such as Prometheus.
317+
- [Node-problem-detector](https://github.com/kubernetes/node-problem-detector): aims to make various node problems visible to upstream layers in the cluster management stack. It is a systemd unit that runs on each node, detects node problems, and reports them to the cluster’s API server via Events and NodeConditions.
318+
- [Local-gadget](https://www.inspektor-gadget.io/docs/latest/local-gadget/): uses in-kernel eBPF helper programs to monitor events mainly related to syscalls from userspace programs in a pod.
319+
320+
These tools assist in providing observability around many node health related problems such as:
321+
322+
- Infrastructure daemon issues: NTP service down
323+
- Hardware issues: Bad CPU, memory or disk
324+
- Kernel issues: Kernel deadlock, corrupted file system
325+
- Container runtime issues: Unresponsive runtime daemon
326+
327+
The extension **does not** require any additional outbound access to any URLs, IP Address or Port beyond the AKS egress requirements that are documented [here](./limit-egress-traffic.md) nor does the extension require any special permissions at the Azure level. It uses kubeconfig to connect to the API server to send the information/telemetry.
311328
312329
<!-- LINKS - internal -->
313330

0 commit comments

Comments
 (0)