You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/auto-upgrade-node-os-image.md
+20-20Lines changed: 20 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,23 +1,23 @@
1
1
---
2
-
title: Auto-Upgrade Azure Kubernetes Service (AKS) Node OS Images
3
-
description: Learn how to set up automatic upgrades on Azure Kubernetes Service (AKS) for all your cluster node operating system images.
2
+
title: Auto-upgrade Node OS Images
3
+
description: Learn how to choose an upgrade channel that best supports your needs for cluster's node OS security and maintenance.
4
4
ms.topic: article
5
5
ms.custom: build-2023, devx-track-azurecli
6
6
ms.author: nickoman
7
7
author: nickomang
8
-
ms.date: 02/03/2023
8
+
ms.date: 11/22/2023
9
9
---
10
10
11
-
# Auto-upgrade Azure Kubernetes Service cluster node OS images
11
+
# Auto-upgrade node OS images
12
12
13
-
AKS now supports the node OS auto-upgrade channel, an exclusive channel dedicated to controlling node-level OS security updates. This channel can't be used for cluster-level Kubernetes version upgrades.
13
+
AKS provides multiple auto-upgrade channels dedicated to timely node-level OS security updates. This channel is different from cluster-level Kubernetes version upgrades and supersedes it.
14
14
15
-
## How does node OS auto-upgrade work with cluster auto-upgrade?
15
+
## Interactions between node OS auto-upgrade and cluster auto-upgrade
16
16
17
17
Node-level OS security updates are released at a faster rate than Kubernetes patch or minor version updates. The node OS auto-upgrade channel grants you flexibility and enables a customized strategy for node-level OS security updates. Then, you can choose a separate plan for cluster-level Kubernetes version [auto-upgrades][Autoupgrade].
18
-
It's highly recommended to use both cluster-level [auto-upgrades][Autoupgrade] and the node OS auto-upgrade channel together. Scheduling can be fine-tuned by applying two separate sets of [maintenance windows][planned-maintenance] - `aksManagedAutoUpgradeSchedule` for the cluster [auto-upgrade][Autoupgrade] channel and `aksManagedNodeOSUpgradeSchedule` for the node OS auto-upgrade channel.
18
+
It's best to use both cluster-level [auto-upgrades][Autoupgrade] and the node OS auto-upgrade channel together. Scheduling can be fine-tuned by applying two separate sets of [maintenance windows][planned-maintenance] - `aksManagedAutoUpgradeSchedule` for the cluster [auto-upgrade][Autoupgrade] channel and `aksManagedNodeOSUpgradeSchedule` for the node OS auto-upgrade channel.
19
19
20
-
## Use node OS auto-upgrade
20
+
## Channels for node OS image upgrades
21
21
22
22
The selected channel determines the timing of upgrades. When making changes to node OS auto-upgrade channels, allow up to 24 hours for the changes to take effect.
23
23
@@ -30,8 +30,8 @@ The following upgrade channels are available. You're allowed to choose one of th
30
30
|---|---|
31
31
|`None`| Your nodes don't have security updates applied automatically. This means you're solely responsible for your security updates.|N/A|
32
32
|`Unmanaged`|OS updates are applied automatically through the OS built-in patching infrastructure. Newly allocated machines are unpatched initially. The OS's infrastructure patches them at some point.|Ubuntu and Azure Linux (CPU node pools) apply security patches through unattended upgrade/dnf-automatic roughly once per day around 06:00 UTC. Windows doesn't automatically apply security patches, so this option behaves equivalently to `None`.|
33
-
|`SecurityPatch`|This channel is in preview and requires enabling the feature flag `NodeOsUpgradeChannelPreview`. Refer to the prerequisites section for details. AKS regularly updates the node's virtual hard disk (VHD) with patches from the image maintainer labeled "security only." There may be disruptions when the security patches are applied to the nodes. When the patches are applied, the VHD is updated and existing machines are upgraded to that VHD, honoring maintenance windows and surge settings. This option incurs the extra cost of hosting the VHDs in your node resource group. If you use this channel, Linux [unattended upgrades][unattended-upgrades] are disabled by default.|Azure Linux doesn't support this channel on GPU-enabled VMs. `SecurityPatch` works on patch versions that are deprecated, so long as the minor Kubernetes version is still supported.|
34
-
|`NodeImage`|AKS updates the nodes with a newly patched VHD containing security fixes and bug fixes on a weekly cadence. The update to the new VHD is disruptive, following maintenance windows and surge settings. No extra VHD cost is incurred when choosing this option. If you use this channel, Linux [unattended upgrades][unattended-upgrades] are disabled by default. Node image upgrades will work on patch versions that are deprecated, so long as the minor Kubernetes version is still supported.|
33
+
|`SecurityPatch`|This channel is in preview and requires enabling the feature flag `NodeOsUpgradeChannelPreview`. Refer to the prerequisites section for details. AKS regularly updates the node's virtual hard disk (VHD) with patches from the image maintainer labeled "security only." There might be disruptions when the security patches are applied to the nodes. When the patches are applied, the VHD is updated and existing machines are upgraded to that VHD, honoring maintenance windows and surge settings. This option incurs the extra cost of hosting the VHDs in your node resource group. If you use this channel, Linux [unattended upgrades][unattended-upgrades] are disabled by default.|Azure Linux doesn't support this channel on GPU-enabled VMs. `SecurityPatch` works on patch versions that are deprecated, so long as the minor Kubernetes version is still supported.|
34
+
|`NodeImage`|AKS updates the nodes with a newly patched VHD containing security fixes and bug fixes on a weekly cadence. The update to the new VHD is disruptive, following maintenance windows and surge settings. No extra VHD cost is incurred when choosing this option. If you use this channel, Linux [unattended upgrades][unattended-upgrades] are disabled by default. Node image upgrades support patch versions that are deprecated, so long as the minor Kubernetes version is still supported.|
35
35
36
36
To set the node OS auto-upgrade channel when creating a cluster, use the *node-os-upgrade-channel* parameter, similar to the following example.
37
37
@@ -45,7 +45,7 @@ To set the node os auto-upgrade channel on existing cluster, update the *node-os
45
45
az aks update --resource-group myResourceGroup --name myAKSCluster --node-os-upgrade-channel SecurityPatch
46
46
```
47
47
48
-
## Update ownership and cadence
48
+
## Update ownership and schedule
49
49
50
50
The default cadence means there's no planned maintenance window applied.
51
51
@@ -55,16 +55,16 @@ The default cadence means there's no planned maintenance window applied.
55
55
|`SecurityPatch`|AKS|Weekly.|
56
56
|`NodeImage`|AKS|Weekly.|
57
57
58
-
## Prerequisites
58
+
## SecurityPatch channel requirements
59
59
60
-
"The following prerequisites are only applicable when using the `SecurityPatch` channel. If you aren't using this channel, you can ignore these requirements.
60
+
To use the `SecurityPatch` channel, your cluster must support these requirements.
61
61
- Must be using API version `11-02-preview` or later
62
62
63
63
- If using Azure CLI, the `aks-preview` CLI extension version `0.5.127` or later must be installed
64
64
65
65
- The `NodeOsUpgradeChannelPreview` feature flag must be enabled on your subscription
66
66
67
-
### Register the 'NodeOsUpgradeChannelPreview' feature flag
67
+
### Register NodeOsUpgradeChannelPreview
68
68
69
69
Register the `NodeOsUpgradeChannelPreview` feature flag by using the [az feature register][az-feature-register] command, as shown in the following example:
70
70
@@ -84,26 +84,26 @@ When the status reflects *Registered*, refresh the registration of the *Microsof
84
84
az provider register --namespace Microsoft.ContainerService
85
85
```
86
86
87
-
## Limitations
87
+
## Node channel known bugs
88
88
89
-
- Currently, when you set the [cluster auto-upgrade channel][Autoupgrade] to `node-image`, it also automatically sets the node OS auto-upgrade channel to `NodeImage`. You can't change node OS auto-upgrade channel value if your cluster auto-upgrade channel is `node-image`. In order to set the node OS auto-upgrade channel value, make sure the [cluster auto-upgrade channel][Autoupgrade] value isn't `node-image`.
89
+
- Currently, when you set the [cluster auto-upgrade channel][Autoupgrade] to `node-image`, it also automatically sets the node OS auto-upgrade channel to `NodeImage`. You can't change node OS auto-upgrade channel value if your cluster auto-upgrade channel is `node-image`. In order to set the node OS auto-upgrade channel value, check the [cluster auto-upgrade channel][Autoupgrade] value isn't `node-image`.
90
90
91
91
- The `SecurityPatch` channel isn't supported on Windows OS node pools.
92
92
93
93
> [!NOTE]
94
94
> By default, any new cluster created with an API version of `06-01-2022` or later will set the node OS auto-upgrade channel value to `NodeImage`. Any existing clusters created with an API version earlier than `06-01-2022` will have the node OS auto-upgrade channel value set to `None` by default.
95
95
96
96
97
-
## Node OS auto-upgrade with Planned Maintenance
97
+
## Node OS planned maintenance windows
98
98
99
-
Planned Maintenance for the node OS auto-upgrade starts at your specified maintenance window.
99
+
Planned maintenance for the node OS auto-upgrade starts at your specified maintenance window.
100
100
101
101
> [!NOTE]
102
102
> To ensure proper functionality, use a maintenance window of four hours or more.
103
103
104
104
For more information on Planned Maintenance, see [Use Planned Maintenance to schedule maintenance windows for your Azure Kubernetes Service (AKS) cluster][planned-maintenance].
105
105
106
-
## FAQ
106
+
## Node OS auto-upgrades FAQ
107
107
108
108
* How can I check the current nodeOsUpgradeChannel value on a cluster?
109
109
@@ -115,7 +115,7 @@ az aks show --resource-group myResourceGroup --name myAKSCluster --query "autoUp
115
115
116
116
* How can I monitor the status of node OS auto-upgrades?
117
117
118
-
To view the status of your node OS auto upgrades, look up [activity logs][monitor-aks] on your cluster. You may also look up specific upgrade-related events as mentioned in [Upgrade an AKS cluster][aks-upgrade]. AKS also emits upgrade-related Event Grid events. To learn more, see [AKS as an Event Grid source][aks-eventgrid].
118
+
To view the status of your node OS auto upgrades, look up [activity logs][monitor-aks] on your cluster. You can also look up specific upgrade-related events as mentioned in [Upgrade an AKS cluster][aks-upgrade]. AKS also emits upgrade-related Event Grid events. To learn more, see [AKS as an Event Grid source][aks-eventgrid].
119
119
120
120
* Can I change the node OS auto-upgrade channel value if my cluster auto-upgrade channel is set to `node-image` ?
0 commit comments