Skip to content

Commit 8d5ba57

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 43e962f + 6536bec commit 8d5ba57

28 files changed

+350
-231
lines changed

articles/aks/private-clusters.md

Lines changed: 28 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -96,6 +96,14 @@ az provider register --namespace Microsoft.Network
9696
```
9797
## Create a private AKS cluster
9898

99+
### Create a resource group
100+
101+
Create a resource group or use an existing resource group for your AKS cluster.
102+
103+
```azurecli-interactive
104+
az group create -l westus -n MyResourceGroup
105+
```
106+
99107
### Default basic networking
100108

101109
```azurecli-interactive
@@ -122,35 +130,29 @@ Where *--enable-private-cluster* is a mandatory flag for a private cluster.
122130
> [!NOTE]
123131
> If the Docker bridge address CIDR (172.17.0.1/16) clashes with the subnet CIDR, change the Docker bridge address appropriately.
124132
125-
## Connect to the private cluster
133+
## Options for connecting to the private cluster
126134

127-
The API server endpoint has no public IP address. Consequently, you must create an Azure virtual machine (VM) in a virtual network and connect to the API server. To do so, do the following:
135+
The API server endpoint has no public IP address. To manage the API server, you will need to use a VM that has access to the AKS cluster's Azure Virtual Network (VNet). There are several options for establishing network connectivity to the private cluster.
128136

129-
1. Get credentials to connect to the cluster.
137+
* Create a VM in the same Azure Virtual Network (VNet) as the AKS cluster.
138+
* Use a VM in a separate network and set up [Virtual network peering][virtual-network-peering]. See the section below for more information on this option.
139+
* Use an [Express Route or VPN][express-route-or-VPN] connection.
130140

131-
```azurecli-interactive
132-
az aks get-credentials --name MyManagedCluster --resource-group MyResourceGroup
133-
```
141+
Creating a VM in the same VNET as the AKS cluster is the easiest option. Express Route and VPNs add costs and require additional networking complexity. Virtual network peering requires you to plan your network CIDR ranges to ensure there are no overlapping ranges.
134142

135-
1. Do either of the following:
136-
* Create a VM in the same virtual network as the AKS cluster.
137-
* Create a VM in a different virtual network, and peer this virtual network with the AKS cluster virtual network.
143+
## Virtual network peering
138144

139-
If you create a VM in a different virtual network, set up a link between this virtual network and the private DNS zone. To do so:
145+
As mentioned, VNet peering is one way to access your private cluster. To use VNet peering you need to set up a link between virtual network and the private DNS zone.
140146

141-
a. Go to the MC_* resource group in the Azure portal.
142-
b. Select the private DNS zone.
143-
c. In the left pane, select the **Virtual network** link.
144-
d. Create a new link to add the virtual network of the VM to the private DNS zone. It takes a few minutes for the DNS zone link to become available.
145-
e. Go back to the MC_* resource group in the Azure portal.
146-
f. In the right pane, select the virtual network. The virtual network name is in the form *aks-vnet-\**.
147-
g. In the left pane, select **Peerings**.
148-
h. Select **Add**, add the virtual network of the VM, and then create the peering.
149-
i. Go to the virtual network where you have the VM, select **Peerings**, select the AKS virtual network, and then create the peering. If the address ranges on the AKS virtual network and the VM's virtual network clash, peering fails. For more information, see [Virtual network peering][virtual-network-peering].
150-
151-
1. Access the VM via Secure Shell (SSH).
152-
1. Install the Kubectl tool, and run the Kubectl commands.
153-
147+
1. Go to the MC_* resource group in the Azure portal.
148+
2. Select the private DNS zone.
149+
3. In the left pane, select the **Virtual network** link.
150+
4. Create a new link to add the virtual network of the VM to the private DNS zone. It takes a few minutes for the DNS zone link to become available.
151+
5. Go back to the MC_* resource group in the Azure portal.
152+
6. In the right pane, select the virtual network. The virtual network name is in the form *aks-vnet-\**.
153+
7. In the left pane, select **Peerings**.
154+
8. Select **Add**, add the virtual network of the VM, and then create the peering.
155+
9. Go to the virtual network where you have the VM, select **Peerings**, select the AKS virtual network, and then create the peering. If the address ranges on the AKS virtual network and the VM's virtual network clash, peering fails. For more information, see [Virtual network peering][virtual-network-peering].
154156

155157
## Dependencies
156158
* The Private Link service is supported on Standard Azure Load Balancer only. Basic Azure Load Balancer isn't supported.
@@ -175,6 +177,8 @@ The API server endpoint has no public IP address. Consequently, you must create
175177
[az-feature-list]: /cli/azure/feature?view=azure-cli-latest#az-feature-list
176178
[az-extension-add]: /cli/azure/extension#az-extension-add
177179
[az-extension-update]: /cli/azure/extension#az-extension-update
178-
[private-link-service]: https://docs.microsoft.com/azure/private-link/private-link-service-overview
180+
[private-link-service]: /private-link/private-link-service-overview
179181
[virtual-network-peering]: ../virtual-network/virtual-network-peering-overview.md
182+
[azure-bastion]: ../bastion/bastion-create-host-portal.md
183+
[express-route-or-vpn]: ../expressroute/expressroute-about-virtual-network-gateways.md
180184

articles/azure-resource-manager/management/request-limits-and-throttling.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ Get-AzResourceGroup -Debug
118118

119119
Which returns many values, including the following response value:
120120

121-
```powershell
121+
```output
122122
DEBUG: ============================ HTTP RESPONSE ============================
123123
124124
Status Code:
@@ -137,7 +137,7 @@ New-AzResourceGroup -Name myresourcegroup -Location westus -Debug
137137

138138
Which returns many values, including the following values:
139139

140-
```powershell
140+
```output
141141
DEBUG: ============================ HTTP RESPONSE ============================
142142
143143
Status Code:

articles/azure-resource-manager/management/resource-providers-and-types.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ Get-AzResourceProvider -ListAvailable | Select-Object ProviderNamespace, Registr
7979

8080
Which returns results similar to:
8181

82-
```powershell
82+
```output
8383
ProviderNamespace RegistrationState
8484
-------------------------------- ------------------
8585
Microsoft.ClassicCompute Registered
@@ -97,7 +97,7 @@ Register-AzResourceProvider -ProviderNamespace Microsoft.Batch
9797

9898
Which returns results similar to:
9999

100-
```powershell
100+
```output
101101
ProviderNamespace : Microsoft.Batch
102102
RegistrationState : Registering
103103
ResourceTypes : {batchAccounts, operations, locations, locations/quotas}
@@ -114,7 +114,7 @@ Get-AzResourceProvider -ProviderNamespace Microsoft.Batch
114114

115115
Which returns results similar to:
116116

117-
```powershell
117+
```output
118118
{ProviderNamespace : Microsoft.Batch
119119
RegistrationState : Registered
120120
ResourceTypes : {batchAccounts}
@@ -131,7 +131,7 @@ To see the resource types for a resource provider, use:
131131

132132
Which returns:
133133

134-
```powershell
134+
```output
135135
batchAccounts
136136
operations
137137
locations
@@ -148,7 +148,7 @@ To get the available API versions for a resource type, use:
148148

149149
Which returns:
150150

151-
```powershell
151+
```output
152152
2017-05-01
153153
2017-01-01
154154
2015-12-01
@@ -166,7 +166,7 @@ To get the supported locations for a resource type, use.
166166

167167
Which returns:
168168

169-
```powershell
169+
```output
170170
West Europe
171171
East US
172172
East US 2
@@ -184,7 +184,7 @@ az provider list --query "[].{Provider:namespace, Status:registrationState}" --o
184184

185185
Which returns results similar to:
186186

187-
```azurecli
187+
```output
188188
Provider Status
189189
-------------------------------- ----------------
190190
Microsoft.ClassicCompute Registered
@@ -212,7 +212,7 @@ az provider show --namespace Microsoft.Batch
212212

213213
Which returns results similar to:
214214

215-
```azurecli
215+
```output
216216
{
217217
"id": "/subscriptions/####-####/providers/Microsoft.Batch",
218218
"namespace": "Microsoft.Batch",
@@ -231,7 +231,7 @@ az provider show --namespace Microsoft.Batch --query "resourceTypes[*].resourceT
231231

232232
Which returns:
233233

234-
```azurecli
234+
```output
235235
Result
236236
---------------
237237
batchAccounts
@@ -250,7 +250,7 @@ az provider show --namespace Microsoft.Batch --query "resourceTypes[?resourceTyp
250250

251251
Which returns:
252252

253-
```azurecli
253+
```output
254254
Result
255255
---------------
256256
2017-05-01
@@ -270,7 +270,7 @@ az provider show --namespace Microsoft.Batch --query "resourceTypes[?resourceTyp
270270

271271
Which returns:
272272

273-
```azurecli
273+
```output
274274
Result
275275
---------------
276276
West Europe

articles/azure-resource-manager/templates/cross-resource-group-deployment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -326,7 +326,7 @@ New-AzResourceGroupDeployment `
326326

327327
The output from the preceding example is:
328328

329-
```powershell
329+
```output
330330
Name Type Value
331331
=============== ========================= ==========
332332
parentRG String Parent resource group is parentGroup

articles/azure-resource-manager/templates/deploy-cli.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,13 +18,13 @@ You can target your deployment to either an Azure subscription or a resource gro
1818

1919
To deploy to a **resource group**, use [az group deployment create](/cli/azure/group/deployment?view=azure-cli-latest#az-group-deployment-create):
2020

21-
```azurecli
21+
```azurecli-interactive
2222
az group deployment create --resource-group <resource-group-name> --template-file <path-to-template>
2323
```
2424

2525
To deploy to a **subscription**, use [az deployment create](/cli/azure/deployment?view=azure-cli-latest#az-deployment-create):
2626

27-
```azurecli
27+
```azurecli-interactive
2828
az deployment create --location <location> --template-file <path-to-template>
2929
```
3030

@@ -97,7 +97,7 @@ To pass parameter values, you can use either inline parameters or a parameter fi
9797

9898
To pass inline parameters, provide the values in `parameters`. For example, to pass a string and array to a template is a Bash shell, use:
9999

100-
```azurecli
100+
```azurecli-interactive
101101
az group deployment create \
102102
--resource-group testgroup \
103103
--template-file demotemplate.json \
@@ -108,7 +108,7 @@ If you're using Azure CLI with Windows Command Prompt (CMD) or PowerShell, pass
108108

109109
You can also get the contents of file and provide that content as an inline parameter.
110110

111-
```azurecli
111+
```azurecli-interactive
112112
az group deployment create \
113113
--resource-group testgroup \
114114
--template-file demotemplate.json \

articles/azure-resource-manager/templates/deploy-to-management-group.md

Lines changed: 6 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -2,18 +2,12 @@
22
title: Deploy resources to management group
33
description: Describes how to deploy resources at the management group scope in an Azure Resource Manager template.
44
ms.topic: conceptual
5-
ms.date: 03/06/2020
5+
ms.date: 03/09/2020
66
---
77

88
# Create resources at the management group level
99

10-
Typically, you deploy Azure resources to a resource group in your Azure subscription. However, you can also create resources at the:
11-
12-
* [subscription level](deploy-to-subscription.md)
13-
* management group level (covered in this article)
14-
* [tenant level](deploy-to-tenant.md)
15-
16-
You use management group level deployments to take actions that make sense at that level, such as assigning [role-based access control](../../role-based-access-control/overview.md) or applying [policies](../../governance/policy/overview.md).
10+
As your organization matures, you may need to define and assign [policies](../../governance/policy/overview.md) or [role-based access controls](../../role-based-access-control/overview.md) for a management group. With management group level templates, you can declaratively apply policies and assign roles at the management group level.
1711

1812
## Supported resources
1913

@@ -36,10 +30,10 @@ For templates, use:
3630
https://schema.management.azure.com/schemas/2019-08-01/managementGroupDeploymentTemplate.json#
3731
```
3832

39-
For parameter files, use:
33+
The schema for a parameter file is the same for all deployment scopes. For parameter files, use:
4034

4135
```json
42-
https://schema.management.azure.com/schemas/2019-08-01/managementGroupDeploymentParameters.json#
36+
https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#
4337
```
4438

4539
## Deployment commands
@@ -158,11 +152,10 @@ The following example assigns an existing policy definition to the management gr
158152

159153
## Template sample
160154

161-
* [Create a resource group, a policy and a policy assignment](https://github.com/Azure/azure-docs-json-samples/blob/master/management-level-deployment/azuredeploy.json).
155+
* [Create a resource group, a policy, and a policy assignment](https://github.com/Azure/azure-docs-json-samples/blob/master/management-level-deployment/azuredeploy.json).
162156

163157
## Next steps
164158

165159
* To learn about assigning roles, see [Manage access to Azure resources using RBAC and Azure Resource Manager templates](../../role-based-access-control/role-assignments-template.md).
166160
* For an example of deploying workspace settings for Azure Security Center, see [deployASCwithWorkspaceSettings.json](https://github.com/krnese/AzureDeploy/blob/master/ARM/deployments/deployASCwithWorkspaceSettings.json).
167-
* To learn about creating Azure Resource Manager templates, see [Authoring templates](template-syntax.md).
168-
* For a list of the available functions in a template, see [Template functions](template-functions.md).
161+
* You can also deploy templates at [subscription level](deploy-to-subscription.md) and [tenant level](deploy-to-tenant.md).

articles/azure-resource-manager/templates/deploy-to-subscription.md

Lines changed: 5 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -2,18 +2,12 @@
22
title: Deploy resources to subscription
33
description: Describes how to create a resource group in an Azure Resource Manager template. It also shows how to deploy resources at the Azure subscription scope.
44
ms.topic: conceptual
5-
ms.date: 03/06/2020
5+
ms.date: 03/09/2020
66
---
77

88
# Create resource groups and resources at the subscription level
99

10-
Typically, you deploy Azure resources to a resource group in your Azure subscription. However, you can also create resources at the:
11-
12-
* subscription level (covered in this article)
13-
* [management group level](deploy-to-management-group.md)
14-
* [tenant level](deploy-to-tenant.md)
15-
16-
You use subscription level deployments to take actions that make sense at that level, such as creating resource groups, or assigning [role-based access control](../../role-based-access-control/overview.md).
10+
To simplify the management of resources in your Azure subscription, you can define and assign [policies](../../governance/policy/overview.md) or [role-based access controls](../../role-based-access-control/overview.md) across the subscription. With subscription level templates, you declaratively apply policies and assign roles at the subscription. You can also create resource groups and deploy resources.
1711

1812
To deploy templates at the subscription level, use Azure CLI, PowerShell, or REST API. The Azure portal doesn't support deployment in the subscription level.
1913

@@ -41,10 +35,10 @@ For templates, use:
4135
https://schema.management.azure.com/schemas/2018-05-01/subscriptionDeploymentTemplate.json#
4236
```
4337

44-
For parameter files, use:
38+
The schema for a parameter file is the same for all deployment scopes. For parameter files, use:
4539

4640
```json
47-
https://schema.management.azure.com/schemas/2018-05-01/subscriptionDeploymentParameters.json#
41+
https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#
4842
```
4943

5044
## Deployment commands
@@ -382,5 +376,4 @@ New-AzSubscriptionDeployment `
382376
* To learn about assigning roles, see [Manage access to Azure resources using RBAC and Azure Resource Manager templates](../../role-based-access-control/role-assignments-template.md).
383377
* For an example of deploying workspace settings for Azure Security Center, see [deployASCwithWorkspaceSettings.json](https://github.com/krnese/AzureDeploy/blob/master/ARM/deployments/deployASCwithWorkspaceSettings.json).
384378
* Sample templates can be found at [GitHub](https://github.com/Azure/azure-quickstart-templates/tree/master/subscription-level-deployments).
385-
* To learn about creating Azure Resource Manager templates, see [Authoring templates](template-syntax.md).
386-
* For a list of the available functions in a template, see [Template functions](template-functions.md).
379+
* You can also deploy templates at [management group level](deploy-to-management-group.md) and [tenant level](deploy-to-tenant.md).

articles/azure-resource-manager/templates/deploy-to-tenant.md

Lines changed: 5 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -2,18 +2,12 @@
22
title: Deploy resources to tenant
33
description: Describes how to deploy resources at the tenant scope in an Azure Resource Manager template.
44
ms.topic: conceptual
5-
ms.date: 03/06/2020
5+
ms.date: 03/09/2020
66
---
77

88
# Create resources at the tenant level
99

10-
Typically, you deploy Azure resources to a resource group in your Azure subscription. However, you can also create resources at the:
11-
12-
* [subscription level](deploy-to-subscription.md)
13-
* [management group level](deploy-to-management-group.md)
14-
* tenant level (covered in this article)
15-
16-
You use tenant level deployments to take actions that make sense at that level, such as assigning [role-based access control](../../role-based-access-control/overview.md) or applying [policies](../../governance/policy/overview.md).
10+
As your organization matures, you may need to define and assign [policies](../../governance/policy/overview.md) or [role-based access controls](../../role-based-access-control/overview.md) across your Azure AD tenant. With tenant level templates, you can declaratively apply policies and assign roles at a global level.
1711

1812
## Supported resources
1913

@@ -36,10 +30,10 @@ For templates, use:
3630
https://schema.management.azure.com/schemas/2019-08-01/tenantDeploymentTemplate.json#
3731
```
3832

39-
For parameter files, use:
33+
The schema for a parameter file is the same for all deployment scopes. For parameter files, use:
4034

4135
```json
42-
https://schema.management.azure.com/schemas/2019-08-01/tenantDeploymentParameters.json#
36+
https://schema.management.azure.com/schemas/2019-04-01/deploymentParameters.json#
4337
```
4438

4539
## Required access
@@ -176,5 +170,4 @@ The [following template](https://github.com/Azure/azure-quickstart-templates/tre
176170
## Next steps
177171

178172
* To learn about assigning roles, see [Manage access to Azure resources using RBAC and Azure Resource Manager templates](../../role-based-access-control/role-assignments-template.md).
179-
* To learn about creating Azure Resource Manager templates, see [Authoring templates](template-syntax.md).
180-
* For a list of the available functions in a template, see [Template functions](template-functions.md).
173+
* You can also deploy templates at [subscription level](deploy-to-subscription.md) or [management group level](deploy-to-management-group.md).

articles/azure-resource-manager/templates/error-resource-quota.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ Get-AzVMUsage -Location "South Central US"
7070

7171
Which returns:
7272

73-
```powershell
73+
```output
7474
Name Current Value Limit Unit
7575
---- ------------- ----- ----
7676
Availability Sets 0 2000 Count

articles/azure-resource-manager/templates/error-sku-not-available.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Get-AzComputeResourceSku | where {$_.Locations -icontains "centralus"}
3636

3737
The results include a list of SKUs for the location and any restrictions for that SKU. Notice that a SKU might be listed as `NotAvailableForSubscription`.
3838

39-
```powershell
39+
```output
4040
ResourceType Name Locations Zone Restriction Capability Value
4141
------------ ---- --------- ---- ----------- ---------- -----
4242
virtualMachines Standard_A0 centralus NotAvailableForSubscription MaxResourceVolumeMB 20480

0 commit comments

Comments
 (0)