You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/auto-upgrade-node-os-image.md
+29-1Lines changed: 29 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,7 @@ The default cadence means there's no planned maintenance window applied.
52
52
|Channel|Updates Ownership|Default cadence|
53
53
|---|---|
54
54
|`Unmanaged`|OS driven security updates. AKS has no control over these updates.|Nightly around 6AM UTC for Ubuntu and Azure Linux. Monthly for Windows.|
55
-
|`SecurityPatch`|AKS|Weekly.|
55
+
|`SecurityPatch`|AKS-tested, fully managed, and applied with safe deployment practices. For more information, refer to [Increased security and resiliency of Canonical workloads on Azure][Blog].|Weekly.|
56
56
|`NodeImage`|AKS|Weekly.|
57
57
58
58
## SecurityPatch channel requirements
@@ -121,6 +121,31 @@ To view the status of your node OS auto upgrades, look up [activity logs][monito
121
121
122
122
No. Currently, when you set the [cluster auto-upgrade channel][Autoupgrade] to `node-image`, it also automatically sets the node OS auto-upgrade channel to `NodeImage`. You can't change the node OS auto-upgrade channel value if your cluster auto-upgrade channel is `node-image`. In order to be able to change the node OS auto-upgrade channel values, make sure the [cluster auto-upgrade channel][Autoupgrade] isn't `node-image`.
123
123
124
+
* Why is `SecurityPatch` recommended over `Unmanaged` channel?
125
+
126
+
On the `Unmanaged` channel, AKS has no control over how and when the security updates are delivered. With `SecurityPatch`, the security updates are fully tested and follow safe deployment practices. `SecurityPatch` also honors maintenance windows. For more details, see [Increased security and resiliency of Canonical workloads on Azure][Blog].
127
+
128
+
* How do I know if a `SecurityPatch` or `NodeImage` upgrade is applied on my node?
129
+
130
+
Run the following command to obtain node labels:
131
+
132
+
```azurecli-interactive
133
+
kubectl get nodes --show-labels
134
+
```
135
+
136
+
Among the labels in the output, you'll see a line similar to the following:
Here, the base node image version is `AKSUbuntu-2204gen2containerd`. If applicable, the security patch version typically follows. In the above example it is `202311.07.0`.
143
+
144
+
The same details also be looked up in the Azure portal under the node label view as illustrated below.
145
+
146
+
:::image type="content" source="./media/auto-upgrade-node-os-image/nodeimage-securitypatch-inline.png" alt-text="A screenshot of the nodes page for an AKS cluster in the Azure portal. The label for node image version clearly shows the base node image as well as the latest applied security patch date." lightbox="./media/auto-upgrade-node-os-image/nodeimage-securitypatch.png":::
147
+
148
+
124
149
<!-- LINKS -->
125
150
[planned-maintenance]: planned-maintenance.md
126
151
[release-tracker]: release-tracker.md
@@ -135,3 +160,6 @@ To view the status of your node OS auto upgrades, look up [activity logs][monito
0 commit comments