Skip to content

Commit 869e531

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 7bb4fe5 + 9ed98c2 commit 869e531

29 files changed

+218
-191
lines changed

articles/aks/load-balancer-standard.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to use a public load balancer with a Standard SKU to expo
55
ms.subservice: aks-networking
66
ms.custom: devx-track-azurecli
77
ms.topic: how-to
8-
ms.date: 02/22/2023
8+
ms.date: 06/17/2023
99
ms.author: allensu
1010
author: asudbring
1111
#Customer intent: As a cluster operator or developer, I want to learn how to create a service in AKS that uses an Azure Load Balancer with a Standard SKU.
@@ -211,7 +211,7 @@ An outbound rule configures outbound NAT for all virtual machines identified by
211211

212212
While you can use an outbound rule with a single public IP address, outbound rules are great for scaling outbound NAT because they ease the configuration burden. You can use multiple IP addresses to plan for large-scale scenarios and outbound rules to mitigate SNAT exhaustion prone patterns. Each IP address provided by a frontend provides 64k ephemeral ports for the load balancer to use as SNAT ports.
213213

214-
When using a *Standard* SKU load balancer with managed outbound public IPs (which are created by default), you can scale the number of managed outbound public IPs using the **`load-balancer-managed-ip-count`** parameter.
214+
When using a *Standard* SKU load balancer with managed outbound public IPs (which are created by default), you can scale the number of managed outbound public IPs using the **`--load-balancer-managed-outbound-ip-count`** parameter.
215215

216216
Use the following command to update an existing cluster. You can also set this parameter to have multiple managed outbound public IPs.
217217

@@ -233,7 +233,7 @@ az aks update \
233233

234234
The above example sets the number of managed outbound public IPs to *2* for the *myAKSCluster* cluster in *myResourceGroup*.
235235

236-
At cluster creation time, you can also use the **`load-balancer-managed-ip-count`** parameter to set the initial number of managed outbound public IPs by appending the **`--load-balancer-managed-outbound-ip-count`** parameter and setting it to your desired value. The default number of managed outbound public IPs is *1*.
236+
At cluster creation time, you can also set the initial number of managed outbound public IPs by appending the **`--load-balancer-managed-outbound-ip-count`** parameter and setting it to your desired value. The default number of managed outbound public IPs is *1*.
237237

238238
### Provide your own outbound public IPs or prefixes
239239

articles/automation/automation-update-azure-modules.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,17 +3,13 @@ title: Update Azure PowerShell modules in Azure Automation
33
description: This article tells how to update common Azure PowerShell modules provided by default in Azure Automation.
44
services: automation
55
ms.subservice: process-automation
6-
ms.date: 05/03/2023
6+
ms.date: 07/03/2023
77
ms.topic: conceptual
88
ms.custom: devx-track-azurepowershell
99
---
1010

1111
# Update Azure PowerShell modules in Automation
1212

13-
> [!Important]
14-
> If you are facing issues while upgrading to **Az.Accounts version 2.12.2** or upgrading to a newer version with dependencies on **Az.Accounts version 2.12.2**, we recommend you use **Az.Accounts version 2.12.1 or lower** to avoid issues with Az modules that are dependent on Az.Accounts. For more information, see [steps to import module with specific versions](shared-resources/modules.md#import-modules-by-using-powershell).
15-
16-
1713
The most common PowerShell modules are provided by default in each Automation account. See [Default modules](shared-resources/modules.md#default-modules). As the Azure team updates the Azure modules regularly, changes can occur with the included cmdlets. These changes, for example, renaming a parameter or deprecating a cmdlet entirely, can negatively affect your runbooks.
1814

1915
> [!NOTE]

articles/azure-monitor/essentials/integrate-keda.md

Lines changed: 22 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ This article walks you through the steps to integrate KEDA into your AKS cluster
3333

3434
## Set up a workload identity
3535

36-
1. Start by setting up some environment variables. Change the values to suit your AKS cluster.
36+
1. Start by setting up some environment variables. Change the values to suit your AKS cluster.
3737

3838
```bash
3939
export RESOURCE_GROUP="rg-keda-integration"
@@ -43,9 +43,11 @@ This article walks you through the steps to integrate KEDA into your AKS cluster
4343
export FEDERATED_IDENTITY_CREDENTIAL_NAME="kedaFedIdentity"
4444
export SERVICE_ACCOUNT_NAMESPACE="keda"
4545
export SERVICE_ACCOUNT_NAME="keda-operator"
46+
export AKS_CLUSTER_NAME="aks-cluster-name"
4647
```
4748

48-
+ `SERVICE_ACCOUNT_NAME` - KEDA must use the service account that was used to create federated credentials.
49+
+ `SERVICE_ACCOUNT_NAME` - KEDA must use the service account that was used to create federated credentials. This can be any user defined name.
50+
+ `AKS_CLUSTER_NAME`- The name of the AKS cluster where you want to deploy KEDA.
4951
+ `SERVICE_ACCOUNT_NAMESPACE` Both KEDA and service account must be in same namespace.
5052
+ `USER_ASSIGNED_IDENTITY_NAME` is the name of the Azure Active directory identity that's created for KEDA.
5153
+ `FEDERATED_IDENTITY_CREDENTIAL_NAME` is the name of the credential that's created for KEDA to use to authenticate with Azure.
@@ -66,13 +68,13 @@ This article walks you through the steps to integrate KEDA into your AKS cluster
6668
1. Store the OIDC issuer url in an environment variable to be used later.
6769

6870
```bash
69-
export AKS_OIDC_ISSUER="$(az aks show -n $CLUSTER_NAME -g $RESOURCE_GROUP --query "oidcIssuerProfile.issuerUrl" -otsv)"
71+
export AKS_OIDC_ISSUER="$(az aks show -n $AKS_CLUSTER_NAME -g $RESOURCE_GROUP --query "oidcIssuerProfile.issuerUrl" -otsv)"
7072
```
7173

7274
1. Create a user assigned identity for KEDA. This identity is used by KEDA to authenticate with Azure Monitor.
7375

7476
```azurecli
75-
az identity create --name $USER_ASSIGNED_IDENTITY_NAME --resource-group $RESOURCE_GROUP --location $LOCATION --subscription $SUBSCRIPTION
77+
az identity create --name $USER_ASSIGNED_IDENTITY_NAME --resource-group $RESOURCE_GROUP --location $LOCATION --subscription $SUBSCRIPTION
7678
```
7779

7880
The output will be similar to the following:
@@ -94,25 +96,25 @@ This article walks you through the steps to integrate KEDA into your AKS cluster
9496

9597
1. Store the `clientId` and `tenantId` in environment variables to use later.
9698
```bash
97-
export USER_ASSIGNED_CLIENT_ID="$(az identity show --resource-group $RESOURCE_GROUP --name $USER_ASSIGNED_IDENTITY_NAME --query 'clientId' -otsv)"
98-
export TENANT_ID="$(az identity show --resource-group $RESOURCE_GROUP --name $USER_ASSIGNED_IDENTITY_NAME --query 'tenantId' -otsv)"
99+
export USER_ASSIGNED_CLIENT_ID="$(az identity show --resource-group $RESOURCE_GROUP --name $USER_ASSIGNED_IDENTITY_NAME --query 'clientId' -otsv)"
100+
export TENANT_ID="$(az identity show --resource-group $RESOURCE_GROUP --name $USER_ASSIGNED_IDENTITY_NAME --query 'tenantId' -otsv)"
99101
```
100102

101-
1. Assign the *Monitoring Data Reader* role to the identity for your Azure Monitor workspace. This role allows the identity to read metrics from your workspace.
103+
1. Assign the *Monitoring Data Reader* role to the identity for your Azure Monitor workspace. This role allows the identity to read metrics from your workspace. Replace the *Azure Monitor Workspace resource group* and *Azure Monitor Workspace name* with the resource group and name of the Azure Monitor workspace which is configured to collect metrics from the AKS cluster.
102104

103105
```azurecli
104106
az role assignment create \
105107
--assignee $USER_ASSIGNED_CLIENT_ID \
106108
--role "Monitoring Data Reader" \
107-
--scope /subscriptions/$SUBSCRIPTION/resourceGroups/<Azure Monitor Workspace resource group>/providers/microsoft.monitor/accounts/ <Azure monitor workspace name>
109+
--scope /subscriptions/$SUBSCRIPTION/resourceGroups/<Azure Monitor Workspace resource group>/providers/microsoft.monitor/accounts/<Azure monitor workspace name>
108110
```
109111

110112

111-
1. Create the KEDA namespace, then create Kubernetes service account. This service account is used by KEDA to authenticate with Azure.
113+
1. Create the KEDA namespace, then create Kubernetes service account. This service account is used by KEDA to authenticate with Azure.
112114

113115
```azurecli
114116
115-
az aks get-credentials -n $CLUSTER_NAME -g $RESOURCE_GROUP
117+
az aks get-credentials -n $AKS_CLUSTER_NAME -g $RESOURCE_GROUP
116118
117119
kubectl create namespace keda
118120
@@ -129,13 +131,13 @@ This article walks you through the steps to integrate KEDA into your AKS cluster
129131

130132
1. Check your service account by running
131133
```bash
132-
kubectl describe serviceaccount workload-identity-sa -n keda
134+
kubectl describe serviceaccount $SERVICE_ACCOUNT_NAME -n keda
133135
```
134136

135137
1. Establish a federated credential between the service account and the user assigned identity. The federated credential allows the service account to use the user assigned identity to authenticate with Azure.
136138

137139
```azurecli
138-
az identity federated-credential create --name $FEDERATED_IDENTITY_CREDENTIAL_NAME --identity-name $USER_ASSIGNED_IDENTITY_NAME --resource-group $RESOURCE_GROUP --issuer $AKS_OIDC_ISSUER --subject system:serviceaccount:$SERVICE_ACCOUNT_NAMESPACE:$SERVICE_ACCOUNT_NAME --audience api://AzureADTokenExchange
140+
az identity federated-credential create --name $FEDERATED_IDENTITY_CREDENTIAL_NAME --identity-name $USER_ASSIGNED_IDENTITY_NAME --resource-group $RESOURCE_GROUP --issuer $AKS_OIDC_ISSUER --subject system:serviceaccount:$SERVICE_ACCOUNT_NAMESPACE:$SERVICE_ACCOUNT_NAME --audience api://AzureADTokenExchange
139141
```
140142

141143
> [!Note]
@@ -145,7 +147,14 @@ This article walks you through the steps to integrate KEDA into your AKS cluster
145147

146148
KEDA can be deployed using YAML manifests, Helm charts, or Operator Hub. This article uses Helm charts. For more information on deploying KEDA, see [Deploying KEDA](https://keda.sh/docs/2.10/deploy/)
147149

148-
Deploy KEDA using the following command.
150+
Add helm repository:
151+
152+
```bash
153+
helm repo add kedacore https://kedacore.github.io/charts
154+
helm repo update
155+
```
156+
157+
Deploy KEDA using the following command:
149158

150159
```bash
151160
helm install keda kedacore/keda --namespace keda \

0 commit comments

Comments
 (0)