Skip to content

Commit 913c391

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents c2cde15 + 2a44dc6 commit 913c391

File tree

100 files changed

+1161
-1148
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

100 files changed

+1161
-1148
lines changed

articles/ai-services/language-service/native-document-support/use-native-documents.md

Lines changed: 2 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -34,15 +34,6 @@ A native document refers to the file format used to create the original document
3434

3535
* [Document summarization](../summarization/overview.md). Document summarization uses natural language processing to generate extractive (salient sentence extraction) or abstractive (contextual word extraction) summaries for documents. Both `AbstractiveSummarization` and `ExtractiveSummarization` APIs support native document processing.
3636

37-
## Development options
38-
39-
Native document support can be integrated into your applications using the [Azure AI Language REST API](/rest/api/language/). The REST API is a language agnostic interface that enables you to create HTTP requests for text-based data analysis.
40-
41-
|Service|Description|API Reference (Latest GA version)|API Reference (Latest Preview version)|
42-
|--|--|--|--|
43-
| Text analysis - runtime | &bullet; Runtime prediction calls to extract **Personally Identifiable Information (PII)**.</br>&bullet; Custom redaction for native documents is supported in the latest **2023-04-14-preview**.|[`2023-04-01`](/rest/api/language/2023-04-01/text-analysis-runtime)|[`2023-04-15-preview`.](/rest/api/language/2023-04-15-preview/text-analysis-runtime)|
44-
| Summarization for documents - runtime|Runtime prediction calls to **query summarization for documents models**.|[`2023-04-01`](/rest/api/language/2023-04-01/text-analysis-runtime/submit-job)|[`2023-04-15-preview`](/rest/api/language/2023-04-15-preview/text-analysis-runtime)|
45-
4637
## Supported document formats
4738

4839
Applications use native file formats to create, save, or open native documents. Currently **PII** and **Document summarization** capabilities supports the following native document formats:
@@ -375,13 +366,13 @@ Before you run the **POST** request, replace `{your-language-resource-endpoint}`
375366
***PowerShell***
376367

377368
```powershell
378-
cmd /c curl "{your-language-resource-endpoint}/language/analyze-text/jobs?api-version=2023-04-01" -i -X POST --header "Content-Type: application/json" --header "Ocp-Apim-Subscription-Key: {your-key}" --data "@document-summarization.json"
369+
cmd /c curl "{your-language-resource-endpoint}/language/analyze-documents/jobs?api-version=2023-11-15-preview" -i -X POST --header "Content-Type: application/json" --header "Ocp-Apim-Subscription-Key: {your-key}" --data "@document-summarization.json"
379370
```
380371

381372
***command prompt / terminal***
382373

383374
```bash
384-
curl -v -X POST "{your-language-resource-endpoint}/language/analyze-text/jobs?api-version=2023-04-01" --header "Content-Type: application/json" --header "Ocp-Apim-Subscription-Key: {your-key}" --data "@document-summarization.json"
375+
curl -v -X POST "{your-language-resource-endpoint}/language/analyze-documents/jobs?api-version=2023-11-15-preview" --header "Content-Type: application/json" --header "Ocp-Apim-Subscription-Key: {your-key}" --data "@document-summarization.json"
385376
```
386377

387378
Here's a sample response:

articles/ai-studio/how-to/configure-managed-network.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,8 @@ You need to configure following network isolation configurations.
2525

2626
- Choose network isolation mode. You have two options: allow internet outbound mode or allow only approved outbound mode.
2727
- Create private endpoint outbound rules to your private Azure resources. Note that private Azure AI Services and Azure AI Search are not supported yet.
28-
- If you use Visual Studio Code integration with allow only approved outbound mode, create FQDN outbound rules described [here](#scenario-use-visual-studio-code).
29-
- If you use HuggingFace models in Models with allow only approved outbound mode, create FQDN outbound rules described [here](#scenario-use-huggingface-models).
28+
- If you use Visual Studio Code integration with allow only approved outbound mode, create FQDN outbound rules described in the [use Visual Studio Code](#scenario-use-visual-studio-code) section.
29+
- If you use HuggingFace models in Models with allow only approved outbound mode, create FQDN outbound rules described in the [use HuggingFace models](#scenario-use-huggingface-models) section.
3030

3131
## Network isolation architecture and isolation modes
3232

@@ -44,7 +44,7 @@ There are three different configuration modes for outbound traffic from the mana
4444

4545
* Always use private endpoints to access Azure resources.
4646
* You must add rules for each outbound connection you need to allow.
47-
* Adding FQDN outbound rules increase your costs as this rule type uses Azure Firewall.
47+
* Adding FQDN outbound rules __increase your costs__ as this rule type uses Azure Firewall.
4848
* The default rules for _allow only approved outbound_ are designed to minimize the risk of data exfiltration. Any outbound rules you add might increase your risk.
4949

5050
The managed VNet is preconfigured with [required default rules](#list-of-required-rules). It's also configured for private endpoint connections to your Azure AI, Azure AI's default storage, container registry and key vault __if they're configured as private__ or __the Azure AI isolation mode is set to allow only approved outbound__. After choosing the isolation mode, you only need to consider other outbound requirements you might need to add.
@@ -259,7 +259,6 @@ If you plan to use __Visual Studio Code__ with Azure AI, add outbound _FQDN_ rul
259259
* `update.code.visualstudio.com`
260260
* `*.vo.msecnd.net`
261261
* `marketplace.visualstudio.com`
262-
* `ghcr.io`
263262
* `pkg-containers.githubusercontent.com`
264263
* `github.com`
265264

@@ -324,3 +323,4 @@ The Azure AI managed VNet feature is free. However, you're charged for the follo
324323
* Managed VNet uses private endpoint connection to access your private resources. You can't have a private endpoint and a service endpoint at the same time for your Azure resources, such as a storage account. We recommend using private endpoints in all scenarios.
325324
* The managed VNet is deleted when the Azure AI is deleted.
326325
* Data exfiltration protection is automatically enabled for the only approved outbound mode. If you add other outbound rules, such as to FQDNs, Microsoft can't guarantee that you're protected from data exfiltration to those outbound destinations.
326+
* Using FQDN outbound rules increases the cost of the managed VNet because FQDN rules use Azure Firewall. For more information, see [Pricing](#pricing).

articles/aks/auto-upgrade-node-os-image.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ It's best to use both cluster-level [auto-upgrades][Autoupgrade] and the node OS
1919

2020
## Channels for node OS image upgrades
2121

22-
The selected channel determines the timing of upgrades. When making changes to node OS auto-upgrade channels, allow up to 24 hours for the changes to take effect.
22+
The selected channel determines the timing of upgrades. When making changes to node OS auto-upgrade channels, allow up to 24 hours for the changes to take effect. Once you change from one channel to another channel, a reimage will be triggered leading to rolling nodes.
2323

2424
> [!NOTE]
2525
> Node OS image auto-upgrade won't affect the cluster's Kubernetes version. It only works for a cluster in a [supported version][supported].

articles/aks/enable-authentication-microsoft-entra-id.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,19 +2,21 @@
22
title: Enable managed identity authentication on Azure Kubernetes Service
33
description: Learn how to enable Microsoft Entra ID on Azure Kubernetes Service with kubelogin and authenticate Azure users with credentials or managed roles.
44
ms.topic: article
5-
ms.date: 11/22/2023
5+
ms.date: 02/08/2024
66
ms.custom: devx-track-azurecli
77
ms.author: miwithro
88
---
99

1010
# Enable Azure managed identity authentication for Kubernetes clusters with kubelogin
1111

12-
The AKS-managed Microsoft Entra integration simplifies the Microsoft Entra integration process. Previously, you were required to create a client and server app, and the Microsoft Entra tenant had to grant Directory Read permissions. Now, the AKS resource provider manages the client and server apps for you.
12+
The AKS-managed Microsoft Entra integration simplifies the Microsoft Entra integration process. Previously, you were required to create a client and server app, and the Microsoft Entra tenant had to assign [Directory Readers][directory-readers-rbac-role] role permissions. Now, the AKS resource provider manages the client and server apps for you.
1313

1414
Cluster administrators can configure Kubernetes role-based access control (Kubernetes RBAC) based on a user's identity or directory group membership. Microsoft Entra authentication is provided to AKS clusters with OpenID Connect. OpenID Connect is an identity layer built on top of the OAuth 2.0 protocol. For more information on OpenID Connect, see the [OpenID Connect documentation][open-id-connect].
1515

1616
Learn more about the Microsoft Entra integration flow in the [Microsoft Entra documentation](concepts-identity.md#azure-ad-integration).
1717

18+
This article provides details on how to enable and use managed identities for Azure resources with your AKS cluster.
19+
1820
## Limitations
1921

2022
The following are constraints integrating Azure managed identity authentication on AKS.
@@ -184,18 +186,20 @@ If you lack administrative access to a valid Microsoft Entra group, you can foll
184186
185187
* Learn about [Microsoft Entra integration with Kubernetes RBAC][azure-ad-rbac].
186188
* Learn more about [AKS and Kubernetes identity concepts][aks-concepts-identity].
189+
* Learn how to [use kubelogin][kubelogin-authentication] for all supported Microsoft Entra authentication methods in AKS.
187190
* Use [Azure Resource Manager (ARM) templates][aks-arm-template] to create AKS-managed Microsoft Entra ID enabled clusters.
188-
189191
<!-- LINKS - external -->
190192
[aks-arm-template]: /azure/templates/microsoft.containerservice/managedclusters
191193
[kubelogin]: https://github.com/Azure/kubelogin
192194
[azure-kubelogin-known-issues]: https://azure.github.io/kubelogin/known-issues.html
193195
194196
<!-- LINKS - Internal -->
197+
[directory-readers-rbac-role]: /entra/identity/role-based-access-control/permissions-reference#directory-readers
195198
[aks-concepts-identity]: concepts-identity.md
196199
[azure-ad-rbac]: azure-ad-rbac.md
197200
[az-aks-create]: /cli/azure/aks#az_aks_create
198201
[az-aks-get-credentials]: /cli/azure/aks#az_aks_get_credentials
199202
[az-group-create]: /cli/azure/group#az_group_create
200203
[open-id-connect]:../active-directory/develop/v2-protocols-oidc.md
201204
[az-aks-update]: /cli/azure/aks#az_aks_update
205+
[kubelogin-authentication]: kubelogin-authentication.md
57 Bytes
Loading

articles/aks/upgrade-cluster.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,12 @@
22
title: Upgrade options for Azure Kubernetes Service (AKS) clusters
33
description: Learn the different ways to upgrade an Azure Kubernetes Service (AKS) cluster.
44
ms.topic: article
5-
ms.date: 01/26/2024
5+
ms.date: 02/08/2024
66
---
77

88
# Upgrade options for Azure Kubernetes Service (AKS) clusters
99

10-
This article shares different upgrade options for AKS clusters. To perform a basic Kubernetes version upgrade, see [Upgrade an AKS cluster](./upgrade-aks-cluster.md).
10+
This article covers the different upgrade options for AKS clusters. To perform a basic Kubernetes version upgrade, see [Upgrade an AKS cluster](./upgrade-aks-cluster.md).
1111

1212
For AKS clusters that use multiple node pools or Windows Server nodes, see [Upgrade a node pool in AKS][nodepool-upgrade]. To upgrade a specific node pool without performing a Kubernetes cluster upgrade, see [Upgrade a specific node pool][specific-nodepool].
1313

@@ -36,7 +36,7 @@ To configure automatic upgrades, see the following articles:
3636

3737
## Special considerations for node pools that span multiple availability zones
3838

39-
AKS uses best-effort zone balancing in node groups. During an upgrade surge, the zones for the surge nodes in Virtual Machine Scale Sets are unknown ahead of time, which can temporarily cause an unbalanced zone configuration during an upgrade. However, AKS deletes surge nodes once the upgrade completes and preserves the original zone balance. If you want to keep your zones balanced during upgrades, you can increase the surge to a multiple of *three nodes*, and Virtual Machine Scale Sets balances your nodes across availability zones with best-effort zone balancing.
39+
AKS uses best-effort zone balancing in node groups. During an upgrade surge, the zones for the surge nodes in Virtual Machine Scale Sets are unknown ahead of time, which can temporarily cause an unbalanced zone configuration during an upgrade. However, AKS deletes surge nodes once the upgrade completes and preserves the original zone balance. If you want to keep your zones balanced during upgrades, you can increase the surge to a multiple of *three nodes*, and Virtual Machine Scale Sets balances your nodes across availability zones with best-effort zone balancing. With best-effort zone balance, the scale set attempts to scale in and out while maintaining balance. However, if for some reason this is not possible (for example, if one zone goes down, the scale set cannot create a new VM in that zone), the scale set allows temporary imbalance to successfully scale in or out.
4040

4141
Persistent volume claims (PVCs) backed by Azure locally redundant storage (LRS) Disks are bound to a particular zone and might fail to recover immediately if the surge node doesn't match the zone of the PVC. If the zones don't match, it can cause downtime on your application when the upgrade operation continues to drain nodes but the PVs are bound to a zone. To handle this case and maintain high availability, configure a [Pod Disruption Budget](https://kubernetes.io/docs/tasks/run-application/configure-pdb/) on your application to allow Kubernetes to respect your availability requirements during the drain operation.
4242

@@ -50,8 +50,8 @@ The combination of [Planned Maintenance Window][planned-maintenance], [Max Surge
5050
* [Node drain timeout][drain-timeout] on the node pool allows you to configure the wait duration for eviction of pods and graceful termination per node during an upgrade. This option is useful when dealing with long running workloads. When the node drain timeout is specified (in minutes), AKS respects waiting on pod disruption budgets. If not specified, the default timeout is 30 minutes.
5151
* [Node soak time][soak-time] (preview) helps stagger node upgrades in a controlled manner and can minimize application downtime during an upgrade. You can specify a wait time, preferably as reasonably close to 0 minutes as possible, to check application readiness between node upgrades. If not specified, the default value is 0 minutes. Node soak time works together with the max surge and node drain timeout properties available in the node pool to deliver the right outcomes in terms of upgrade speed and application availability.
5252

53-
> [!NOTE]
54-
> To use node soak duration (preview), you must have the aks-preview Azure CLI extension version 0.5.173 or later installed.
53+
> [!NOTE]
54+
> To use node soak duration (preview), you must have the `aks-preview` Azure CLI extension version 0.5.173 or later installed.
5555
5656
## Next steps
5757

articles/aks/use-managed-identity.md

Lines changed: 18 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,26 @@ ms.topic: article
55
ms.custom:
66
- devx-track-azurecli
77
- ignite-2023
8-
ms.date: 01/25/2024
8+
ms.date: 02/08/2024
99
---
1010

1111
# Use a managed identity in Azure Kubernetes Service (AKS)
1212

13-
Azure Kubernetes Service (AKS) clusters require an identity to access Azure resources like load balancers and managed disks. This identity can be a *managed identity* or *service principal*. A system-assigned managed identity is automatically created when you create an AKS cluster. This identity is managed by the Azure platform and doesn't require you to provision or rotate any secrets. For more information about managed identities in Microsoft Entra ID, see [Managed identities for Azure resources][managed-identity-resources-overview].
13+
Azure Kubernetes Service (AKS) clusters require an identity to access Azure resources like load balancers and managed disks. The identity can be a *managed identity* or a *service principal*.
1414

15-
AKS doesn't automatically create a [service principal](kubernetes-service-principal.md), so you have to create one. Clusters that use a service principal eventually expire, and the service principal must be renewed to avoid impacting cluster authentication with the identity. Managing service principals adds complexity, so it's easier to use managed identities instead. The same permission requirements apply for both service principals and managed identities. Managed identities use certificate-based authentication. Each managed identity's credentials have an expiration of *90 days* and are rolled after *45 days*. AKS uses both system-assigned and user-assigned managed identity types, and these identities are immutable.
15+
This article provides details on how to enable the following managed identity types on a new or existing AKS cluster:
16+
17+
* System-assigned managed identity
18+
* Bring your own user-assigned managed identity
19+
* Pre-created Kubelet managed identity
20+
21+
## Overview
22+
23+
When you deploy an AKS cluster, a system-assigned managed identity is automatically created, and it's managed by the Azure platform, so it doesn't require you to provision or rotate any secrets. For more information, see [managed identities for Azure resources][managed-identity-resources-overview].
24+
25+
AKS doesn't automatically create a [service principal](kubernetes-service-principal.md), so you have to create one. Clusters that use a service principal eventually expire, and the service principal must be renewed to avoid impacting cluster authentication with the identity. Managing service principals adds complexity, so it's easier to use managed identities instead. The same permission requirements apply for both service principals and managed identities. Managed identities use certificate-based authentication. Each managed identity's credentials have an expiration of *90 days* and are rolled after *45 days*.
26+
27+
AKS uses both system-assigned and user-assigned managed identity types, and these identities are immutable.
1628

1729
> [!IMPORTANT]
1830
> The open source [Microsoft Entra pod-managed identity][entra-id-pod-managed-identity] (preview) in Azure Kubernetes Service was deprecated on 10/24/2022, and the project archived in Sept. 2023. For more information, see the [deprecation notice](https://github.com/Azure/aad-pod-identity#-announcement). The AKS Managed add-on begins deprecation in Sept. 2024.
@@ -54,7 +66,7 @@ AKS uses several managed identities for built-in services and add-ons.
5466
| Add-on | Ingress application gateway | Manages required network resources. | Contributor role for node resource group | No
5567
| Add-on | omsagent | Used to send AKS metrics to Azure Monitor. | Monitoring Metrics Publisher role | No
5668
| Add-on | Virtual-Node (ACIConnector) | Manages required network resources for Azure Container Instances (ACI). | Contributor role for node resource group | No
57-
| Add-on | Cost analysis | Used to gather cost allocation data | |
69+
| Add-on | Cost analysis | Used to gather cost allocation data | |
5870
| OSS project | Microsoft Entra ID-pod-identity | Enables applications to access cloud resources securely with Microsoft Entra ID. | N/A | Steps to grant permission at [Microsoft Entra Pod Identity Role Assignment configuration](./use-azure-ad-pod-identity.md).
5971

6072
## Enable managed identities on a new AKS cluster
@@ -471,7 +483,8 @@ Now you can create your AKS cluster with your existing identities. Make sure to
471483
472484
## Next steps
473485
474-
Use [Azure Resource Manager templates][aks-arm-template] to create a managed identity-enabled cluster.
486+
* Use [Azure Resource Manager templates][aks-arm-template] to create a managed identity-enabled cluster.
487+
* Learn how to [use kubelogin][kubelogin-authentication] for all supported Microsoft Entra authentication methods in AKS.
475488
476489
<!-- LINKS - external -->
477490
[aks-arm-template]: /azure/templates/microsoft.containerservice/managedclusters

0 commit comments

Comments
 (0)