You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/api-server-vnet-integration.md
+27-27Lines changed: 27 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -75,17 +75,17 @@ You can configure your AKS clusters with API Server VNet Integration in managed
75
75
* Create a resource group using the [`az group create`][az-group-create] command.
76
76
77
77
```azurecli-interactive
78
-
az group create -l westus2 -n <resource-group>
78
+
az group create --location westus2 --name <resource-group>
79
79
```
80
80
81
81
### Deploy a public cluster
82
82
83
83
* Deploy a public AKS cluster with API Server VNet integration for managed VNet using the [`az aks create`][az-aks-create] command with the `--enable-api-server-vnet-integration` flag.
84
84
85
85
```azurecli-interactive
86
-
az aks create -n <cluster-name> \
87
-
-g <resource-group> \
88
-
-l <location> \
86
+
az aks create --name <cluster-name> \
87
+
--resource-group <resource-group> \
88
+
--location <location> \
89
89
--network-plugin azure \
90
90
--enable-apiserver-vnet-integration
91
91
```
@@ -95,9 +95,9 @@ You can configure your AKS clusters with API Server VNet Integration in managed
95
95
* Deploy a private AKS cluster with API Server VNet integration for managed VNet using the [`az aks create`][az-aks-create] command with the `--enable-api-server-vnet-integration` and `--enable-private-cluster` flags.
96
96
97
97
```azurecli-interactive
98
-
az aks create -n <cluster-name> \
99
-
-g <resource-group> \
100
-
-l <location> \
98
+
az aks create --name <cluster-name> \
99
+
--resource-group <resource-group> \
100
+
--location <location> \
101
101
--network-plugin azure \
102
102
--enable-private-cluster \
103
103
--enable-apiserver-vnet-integration
@@ -117,24 +117,24 @@ The cluster identity needs permissions to both the API server subnet and the nod
117
117
* Create a resource group using the [`az group create`][az-group-create] command.
118
118
119
119
```azurecli-interactive
120
-
az group create -l <location> -n <resource-group>
120
+
az group create --location <location> --name <resource-group>
121
121
```
122
122
123
123
### Create a virtual network
124
124
125
125
1. Create a virtual network using the [`az network vnet create`][az-network-vnet-create] command.
126
126
127
127
```azurecli-interactive
128
-
az network vnet create -n <vnet-name> \
129
-
-g <resource-group> \
130
-
-l <location> \
128
+
az network vnet create --name <vnet-name> \
129
+
--resource-group <resource-group> \
130
+
--location <location> \
131
131
--address-prefixes 172.19.0.0/16
132
132
```
133
133
134
134
2. Create an API server subnet using the [`az network vnet subnet create`][az-network-vnet-subnet-create] command.
135
135
136
136
```azurecli-interactive
137
-
az network vnet subnet create -g <resource-group> \
137
+
az network vnet subnet create --resource-group <resource-group> \
@@ -144,7 +144,7 @@ az group create -l <location> -n <resource-group>
144
144
3. Create a cluster subnet using the [`az network vnet subnet create`][az-network-vnet-subnet-create] command.
145
145
146
146
```azurecli-interactive
147
-
az network vnet subnet create -g <resource-group> \
147
+
az network vnet subnet create --resource-group <resource-group> \
148
148
--vnet-name <vnet-name> \
149
149
--name <cluster-subnet-name> \
150
150
--address-prefixes 172.19.1.0/24
@@ -155,7 +155,7 @@ az group create -l <location> -n <resource-group>
155
155
1. Create a managed identity using the [`az identity create`][az-identity-create] command.
156
156
157
157
```azurecli-interactive
158
-
az identity create -g <resource-group> -n <managed-identity-name> -l <location>
158
+
az identity create --resource-group <resource-group> --name <managed-identity-name> --location <location>
159
159
```
160
160
161
161
2. Assign the Network Contributor role to the API server subnet using the [`az role assignment create`][az-role-assignment-create] command.
@@ -179,9 +179,9 @@ az group create -l <location> -n <resource-group>
179
179
* Deploy a public AKS cluster with API Server VNet integration using the [`az aks create`][az-aks-create] command with the `--enable-api-server-vnet-integration` flag.
180
180
181
181
```azurecli-interactive
182
-
az aks create -n <cluster-name> \
183
-
-g <resource-group> \
184
-
-l <location> \
182
+
az aks create --name <cluster-name> \
183
+
--resource-group <resource-group> \
184
+
--location <location> \
185
185
--network-plugin azure \
186
186
--enable-apiserver-vnet-integration \
187
187
--vnet-subnet-id <cluster-subnet-resource-id> \
@@ -194,9 +194,9 @@ az group create -l <location> -n <resource-group>
194
194
* Deploy a private AKS cluster with API Server VNet integration using the [`az aks create`][az-aks-create] command with the `--enable-api-server-vnet-integration` and `--enable-private-cluster` flags.
195
195
196
196
```azurecli-interactive
197
-
az aks create -n <cluster-name> \
198
-
-g <resource-group> \
199
-
-l <location> \
197
+
az aks create --name <cluster-name> \
198
+
--resource-group <resource-group> \
199
+
--location <location> \
200
200
--network-plugin azure \
201
201
--enable-private-cluster \
202
202
--enable-apiserver-vnet-integration \
@@ -217,8 +217,8 @@ This upgrade performs a node-image version upgrade on all node pools and restart
217
217
* Update your cluster to API Server VNet Integration using the [`az aks update`][az-aks-update] command with the `--enable-apiserver-vnet-integration` flag.
### Create and export a self-signed SSL certificate
@@ -79,7 +79,7 @@ For testing, you can use a self-signed public certificate instead of a Certifica
79
79
Import the SSL certificate into Azure Key Vault using the [`az keyvault certificate import`][az-keyvault-certificate-import] command. If your certificate is password protected, you can pass the password through the `--password` flag.
80
80
81
81
```azurecli-interactive
82
-
az keyvault certificate import --vault-name <KeyVaultName> -n<KeyVaultCertificateName> -f aks-ingress-tls.pfx [--password <certificate password if specified>]
82
+
az keyvault certificate import --vault-name <KeyVaultName> --name<KeyVaultCertificateName> --file aks-ingress-tls.pfx [--password <certificate password if specified>]
Then update the app routing add-on to enable the Azure Key Vault secret store CSI driver and apply the role assignment.
104
104
105
105
```azurecli-interactive
106
-
az aks approuting update -g <ResourceGroupName> -n <ClusterName> --enable-kv --attach-kv ${KEYVAULTID}
106
+
az aks approuting update --resource-group <ResourceGroupName> --name <ClusterName> --enable-kv --attach-kv ${KEYVAULTID}
107
107
```
108
108
109
109
## Enable Azure DNS integration
@@ -121,7 +121,7 @@ To enable support for DNS zones, review the following prerequisite:
121
121
1. Create an Azure DNS zone using the [`az network dns zone create`][az-network-dns-zone-create] command.
122
122
123
123
```azurecli-interactive
124
-
az network dns zone create -g<ResourceGroupName> -n<ZoneName>
124
+
az network dns zone create --resource-group<ResourceGroupName> --name<ZoneName>
125
125
```
126
126
127
127
### Attach Azure DNS zone to the application routing add-on
@@ -132,13 +132,13 @@ To enable support for DNS zones, review the following prerequisite:
132
132
1. Retrieve the resource ID for the DNS zone using the [`az network dns zone show`][az-network-dns-zone-show] command and set the output to a variable named *ZONEID*.
133
133
134
134
```azurecli-interactive
135
-
ZONEID=$(az network dns zone show -g <ResourceGroupName> -n <ZoneName> --query "id" --output tsv)
135
+
ZONEID=$(az network dns zone show --resource-group <ResourceGroupName> --name <ZoneName> --query "id" --output tsv)
136
136
```
137
137
138
138
1. Update the add-on to enable the integration with Azure DNS using the [`az aks approuting zone`][az-aks-approuting-zone] command. You can pass a comma-separated list of DNS zone resource IDs.
139
139
140
140
```azurecli-interactive
141
-
az aks approuting zone add -g <ResourceGroupName> -n <ClusterName> --ids=${ZONEID} --attach-zones
141
+
az aks approuting zone add --resource-group <ResourceGroupName> --name <ClusterName> --ids=${ZONEID} --attach-zones
142
142
```
143
143
144
144
## Create the Ingress that uses a host name and a certificate from Azure Key Vault
@@ -148,7 +148,7 @@ The application routing add-on creates an Ingress class on the cluster named *we
148
148
1. Get the certificate URI to use in the Ingress from Azure Key Vault using the [`az keyvault certificate show`][az-keyvault-certificate-show] command.
149
149
150
150
```azurecli-interactive
151
-
az keyvault certificate show --vault-name <KeyVaultName> -n <KeyVaultCertificateName> --query "id" --output tsv
151
+
az keyvault certificate show --vault-name <KeyVaultName> --name <KeyVaultCertificateName> --query "id" --output tsv
152
152
```
153
153
154
154
The following example output shows the certificate URI returned from the command:
Copy file name to clipboardExpand all lines: articles/aks/app-routing-migration.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ In this article, you learn how to migrate your Azure Kubernetes Service (AKS) cl
25
25
1. Enable the application routing add-on.
26
26
27
27
```azurecli-interactive
28
-
az aks approuting enable -g <ResourceGroupName> -n <ClusterName>
28
+
az aks approuting enable --resource-group <ResourceGroupName> --name <ClusterName>
29
29
```
30
30
31
31
2. Update your Ingresses, setting `ingressClassName` to `webapprouting.kubernetes.azure.com`. Remove the `kubernetes.io/ingress.class` annotation. You also need to update the host to one that you own, as the application routing add-on doesn't have a managed cluster DNS zone. If you don't have a DNS zone, follow instructions to [create][app-routing-dns-create] and [configure][app-routing-dns-configure] one.
@@ -84,7 +84,7 @@ In this article, you learn how to migrate your Azure Kubernetes Service (AKS) cl
84
84
4. Disable the HTTP application routing add-on.
85
85
86
86
```azurecli-interactive
87
-
az aks disable-addons -g <ResourceGroupName> -n <ClusterName> --addons http_application_routing
87
+
az aks disable-addons --resource-group <ResourceGroupName> --name <ClusterName> --addons http_application_routing
88
88
```
89
89
90
90
## Remove and delete all HTTP application routing resources
Copy file name to clipboardExpand all lines: articles/aks/app-routing.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,15 +54,15 @@ With the retirement of [Open Service Mesh][open-service-mesh-docs] (OSM) by the
54
54
To enable application routing on a new cluster, use the [`az aks create`][az-aks-create] command, specifying the `--enable-app-routing` flag.
55
55
56
56
```azurecli-interactive
57
-
az aks create -g <ResourceGroupName> -n <ClusterName> -l <Location> --enable-app-routing
57
+
az aks create --resource-group <ResourceGroupName> --name <ClusterName> --location <Location> --enable-app-routing
58
58
```
59
59
60
60
### Enable on an existing cluster
61
61
62
62
To enable application routing on an existing cluster, use the [`az aks approuting enable`][az-aks-approuting-enable] command.
63
63
64
64
```azurecli-interactive
65
-
az aks approuting enable -g <ResourceGroupName> -n <ClusterName>
65
+
az aks approuting enable --resource-group <ResourceGroupName> --name <ClusterName>
66
66
```
67
67
68
68
# [Open Service Mesh (OSM) (retired)](#tab/with-osm)
@@ -79,16 +79,16 @@ The following add-ons are required to support this configuration:
79
79
Enable application routing on a new AKS cluster using the [`az aks create`][az-aks-create] command specifying the `--enable-app-routing` flag and the `--enable-addons` parameter with the `open-service-mesh` add-on:
80
80
81
81
```azurecli-interactive
82
-
az aks create -g <ResourceGroupName> -n <ClusterName> -l <Location> --enable-app-routing --enable-addons open-service-mesh
82
+
az aks create --resource-group <ResourceGroupName> --name <ClusterName> --location <Location> --enable-app-routing --enable-addons open-service-mesh
83
83
```
84
84
85
85
### Enable on an existing cluster
86
86
87
87
To enable application routing on an existing cluster, use the [`az aks approuting enable`][az-aks-approuting-enable] command and the [`az aks enable-addons`][az-aks-enable-addons] command with the `--addons` parameter set to `open-service-mesh`:
88
88
89
89
```azurecli-interactive
90
-
az aks approuting enable -g <ResourceGroupName> -n <ClusterName>
91
-
az aks enable-addons -g <ResourceGroupName> -n <ClusterName> --addons open-service-mesh
90
+
az aks approuting enable --resource-group <ResourceGroupName> --name <ClusterName>
91
+
az aks enable-addons --resource-group <ResourceGroupName> --name <ClusterName> --addons open-service-mesh
92
92
```
93
93
94
94
> [!NOTE]
@@ -104,15 +104,15 @@ az aks enable-addons -g <ResourceGroupName> -n <ClusterName> --addons open-servi
104
104
To enable application routing on a new cluster, use the [`az aks create`][az-aks-create] command, specifying `--enable-app-routing` flag.
105
105
106
106
```azurecli-interactive
107
-
az aks create -g <ResourceGroupName> -n <ClusterName> -l <Location> --enable-app-routing
107
+
az aks create --resource-group <ResourceGroupName> --name <ClusterName> --location <Location> --enable-app-routing
108
108
```
109
109
110
110
### Enable on an existing cluster
111
111
112
112
To enable application routing on an existing cluster, use the [`az aks approuting enable`][az-aks-approuting-enable] command:
113
113
114
114
```azurecli-interactive
115
-
az aks approuting enable -g <ResourceGroupName> -n <ClusterName>
115
+
az aks approuting enable --resource-group <ResourceGroupName> --name <ClusterName>
116
116
```
117
117
118
118
---
@@ -124,7 +124,7 @@ To connect to the Kubernetes cluster from your local computer, you use [kubectl]
124
124
Configure `kubectl` to connect to your Kubernetes cluster using the [az aks get-credentials][az-aks-get-credentials] command.
125
125
126
126
```azurecli-interactive
127
-
az aks get-credentials -g <ResourceGroupName> -n <ClusterName>
127
+
az aks get-credentials --resource-group <ResourceGroupName> -name <ClusterName>
Copy file name to clipboardExpand all lines: articles/aks/create-nginx-ingress-private-controller.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,7 @@ az network vnet create \
52
52
You create a DNS zone using the [az network private-dns zone create][az-network-private-dns-zone-create] command, specifying the name of the zone and the resource group to create it in. The following example creates a DNS zone named *private.contoso.com* in the *myResourceGroup* resource group.
53
53
54
54
```azurecli-interactive
55
-
az network private-dns zone create --resource-group myResourceGoup -n private.contoso.com
55
+
az network private-dns zone create --resource-group myResourceGoup --name private.contoso.com
56
56
```
57
57
58
58
You create a virtual network link to the DNS zone created earlier using the [az network private-dns link vnet create][az-network-private-dns-link-vnet-create] command. The following example creates a link named *myDNSLink* to the zone *private.contoso.com* for the virtual network *myAzureVNet*. Include the `--registration-enabled` parameter to specify the link is not registration enabled.
Copy file name to clipboardExpand all lines: articles/aks/csi-storage-drivers.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ To enable CSI storage drivers on a new cluster, include one of the following par
50
50
*`--enable-snapshot-controller` allows you to enable the [snapshot controller][snapshot-controller].
51
51
52
52
```azurecli
53
-
az aks update -n myAKSCluster -g myResourceGroup --enable-disk-driver --enable-file-driver --enable-blob-driver --enable-snapshot-controller
53
+
az aks update --name myAKSCluster --resource-group myResourceGroup --enable-disk-driver --enable-file-driver --enable-blob-driver --enable-snapshot-controller
54
54
```
55
55
56
56
It may take several minutes to complete this action. Once it's complete, you should see in the output the status of enabling the driver on your cluster. The following example resembles the section indicating the results when enabling the Blob storage CSI driver:
@@ -72,13 +72,13 @@ To disable CSI storage drivers on a new cluster, include one of the following pa
72
72
*`--disable-snapshot-controller` allows you to disable the [snapshot controller][snapshot-controller].
73
73
74
74
```azurecli
75
-
az aks create -n myAKSCluster -g myResourceGroup --disable-disk-driver --disable-file-driver --disable-blob-driver --disable-snapshot-controller
75
+
az aks create --name myAKSCluster --resource-group myResourceGroup --disable-disk-driver --disable-file-driver --disable-blob-driver --disable-snapshot-controller
76
76
```
77
77
78
78
To disable CSI storage drivers on an existing cluster, use one of the parameters listed earlier depending on the storage system:
79
79
80
80
```azurecli
81
-
az aks update -n myAKSCluster -g myResourceGroup --disable-disk-driver --disable-file-driver --disable-blob-driver --disable-snapshot-controller
81
+
az aks update --name myAKSCluster --resource-group myResourceGroup --disable-disk-driver --disable-file-driver --disable-blob-driver --disable-snapshot-controller
0 commit comments