Skip to content

Commit 938c770

Browse files
authored
Merge pull request #260913 from kaarthis/upgrade-dec
NodeOs update1
2 parents 9f33524 + 909fa66 commit 938c770

File tree

3 files changed

+29
-1
lines changed

3 files changed

+29
-1
lines changed

articles/aks/auto-upgrade-node-os-image.md

Lines changed: 29 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ The default cadence means there's no planned maintenance window applied.
5252
|Channel|Updates Ownership|Default cadence|
5353
|---|---|
5454
| `Unmanaged`|OS driven security updates. AKS has no control over these updates.|Nightly around 6AM UTC for Ubuntu and Azure Linux. Monthly for Windows.|
55-
| `SecurityPatch`|AKS|Weekly.|
55+
| `SecurityPatch`|AKS-tested, fully managed, and applied with safe deployment practices. For more information, refer to [Increased security and resiliency of Canonical workloads on Azure][Blog].|Weekly.|
5656
| `NodeImage`|AKS|Weekly.|
5757

5858
## SecurityPatch channel requirements
@@ -121,6 +121,31 @@ To view the status of your node OS auto upgrades, look up [activity logs][monito
121121

122122
No. Currently, when you set the [cluster auto-upgrade channel][Autoupgrade] to `node-image`, it also automatically sets the node OS auto-upgrade channel to `NodeImage`. You can't change the node OS auto-upgrade channel value if your cluster auto-upgrade channel is `node-image`. In order to be able to change the node OS auto-upgrade channel values, make sure the [cluster auto-upgrade channel][Autoupgrade] isn't `node-image`.
123123

124+
* Why is `SecurityPatch` recommended over `Unmanaged` channel?
125+
126+
On the `Unmanaged` channel, AKS has no control over how and when the security updates are delivered. With `SecurityPatch`, the security updates are fully tested and follow safe deployment practices. `SecurityPatch` also honors maintenance windows. For more details, see [Increased security and resiliency of Canonical workloads on Azure][Blog].
127+
128+
* How do I know if a `SecurityPatch` or `NodeImage` upgrade is applied on my node?
129+
130+
Run the following command to obtain node labels:
131+
132+
```azurecli-interactive
133+
kubectl get nodes --show-labels
134+
```
135+
136+
Among the labels in the output, you'll see a line similar to the following:
137+
138+
```output
139+
kubernetes.azure.com/node-image-version=AKSUbuntu-2204gen2containerd-202311.07.0
140+
```
141+
142+
Here, the base node image version is `AKSUbuntu-2204gen2containerd`. If applicable, the security patch version typically follows. In the above example it is `202311.07.0`.
143+
144+
The same details also be looked up in the Azure portal under the node label view as illustrated below.
145+
146+
:::image type="content" source="./media/auto-upgrade-node-os-image/nodeimage-securitypatch-inline.png" alt-text="A screenshot of the nodes page for an AKS cluster in the Azure portal. The label for node image version clearly shows the base node image as well as the latest applied security patch date." lightbox="./media/auto-upgrade-node-os-image/nodeimage-securitypatch.png":::
147+
148+
124149
<!-- LINKS -->
125150
[planned-maintenance]: planned-maintenance.md
126151
[release-tracker]: release-tracker.md
@@ -135,3 +160,6 @@ To view the status of your node OS auto upgrades, look up [activity logs][monito
135160
[monitor-aks]: ./monitor-aks-reference.md
136161
[aks-eventgrid]: ./quickstart-event-grid.md
137162
[aks-upgrade]: ./upgrade-cluster.md
163+
164+
<!-- LINKS - external -->
165+
[Blog]: https://techcommunity.microsoft.com/t5/linux-and-open-source-blog/increased-security-and-resiliency-of-canonical-workloads-on/ba-p/3970623
195 KB
Loading
175 KB
Loading

0 commit comments

Comments
 (0)