You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/load-balancer-standard.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ description: Learn how to use a public load balancer with a Standard SKU to expo
5
5
ms.subservice: aks-networking
6
6
ms.custom: devx-track-azurecli
7
7
ms.topic: how-to
8
-
ms.date: 02/22/2023
8
+
ms.date: 06/17/2023
9
9
ms.author: allensu
10
10
author: asudbring
11
11
#Customer intent: As a cluster operator or developer, I want to learn how to create a service in AKS that uses an Azure Load Balancer with a Standard SKU.
@@ -211,7 +211,7 @@ An outbound rule configures outbound NAT for all virtual machines identified by
211
211
212
212
While you can use an outbound rule with a single public IP address, outbound rules are great for scaling outbound NAT because they ease the configuration burden. You can use multiple IP addresses to plan for large-scale scenarios and outbound rules to mitigate SNAT exhaustion prone patterns. Each IP address provided by a frontend provides 64k ephemeral ports for the load balancer to use as SNAT ports.
213
213
214
-
When using a *Standard* SKU load balancer with managed outbound public IPs (which are created by default), you can scale the number of managed outbound public IPs using the **`load-balancer-managed-ip-count`** parameter.
214
+
When using a *Standard* SKU load balancer with managed outbound public IPs (which are created by default), you can scale the number of managed outbound public IPs using the **`--load-balancer-managed-outbound-ip-count`** parameter.
215
215
216
216
Use the following command to update an existing cluster. You can also set this parameter to have multiple managed outbound public IPs.
217
217
@@ -233,7 +233,7 @@ az aks update \
233
233
234
234
The above example sets the number of managed outbound public IPs to *2* for the *myAKSCluster* cluster in *myResourceGroup*.
235
235
236
-
At cluster creation time, you can also use the **`load-balancer-managed-ip-count`** parameter to set the initial number of managed outbound public IPs by appending the **`--load-balancer-managed-outbound-ip-count`** parameter and setting it to your desired value. The default number of managed outbound public IPs is *1*.
236
+
At cluster creation time, you can also set the initial number of managed outbound public IPs by appending the **`--load-balancer-managed-outbound-ip-count`** parameter and setting it to your desired value. The default number of managed outbound public IPs is *1*.
237
237
238
238
### Provide your own outbound public IPs or prefixes
description: This article tells how to update common Azure PowerShell modules provided by default in Azure Automation.
4
4
services: automation
5
5
ms.subservice: process-automation
6
-
ms.date: 05/03/2023
6
+
ms.date: 07/03/2023
7
7
ms.topic: conceptual
8
8
ms.custom: devx-track-azurepowershell
9
9
---
10
10
11
11
# Update Azure PowerShell modules in Automation
12
12
13
-
> [!Important]
14
-
> If you are facing issues while upgrading to **Az.Accounts version 2.12.2** or upgrading to a newer version with dependencies on **Az.Accounts version 2.12.2**, we recommend you use **Az.Accounts version 2.12.1 or lower** to avoid issues with Az modules that are dependent on Az.Accounts. For more information, see [steps to import module with specific versions](shared-resources/modules.md#import-modules-by-using-powershell).
15
-
16
-
17
13
The most common PowerShell modules are provided by default in each Automation account. See [Default modules](shared-resources/modules.md#default-modules). As the Azure team updates the Azure modules regularly, changes can occur with the included cmdlets. These changes, for example, renaming a parameter or deprecating a cmdlet entirely, can negatively affect your runbooks.
1. Assign the *Monitoring Data Reader* role to the identity for your Azure Monitor workspace. This role allows the identity to read metrics from your workspace.
103
+
1. Assign the *Monitoring Data Reader* role to the identity for your Azure Monitor workspace. This role allows the identity to read metrics from your workspace. Replace the *Azure Monitor Workspace resource group* and *Azure Monitor Workspace name* with the resource group and name of the Azure Monitor workspace which is configured to collect metrics from the AKS cluster.
1. Create the KEDA namespace, then create Kubernetes service account. This service account is used by KEDA to authenticate with Azure.
113
+
1. Create the KEDA namespace, then create Kubernetes service account. This service account is used by KEDA to authenticate with Azure.
112
114
113
115
```azurecli
114
116
115
-
az aks get-credentials -n $CLUSTER_NAME -g $RESOURCE_GROUP
117
+
az aks get-credentials -n $AKS_CLUSTER_NAME -g $RESOURCE_GROUP
116
118
117
119
kubectl create namespace keda
118
120
@@ -129,13 +131,13 @@ This article walks you through the steps to integrate KEDA into your AKS cluster
129
131
130
132
1. Check your service account by running
131
133
```bash
132
-
kubectl describe serviceaccount workload-identity-sa -n keda
134
+
kubectl describe serviceaccount $SERVICE_ACCOUNT_NAME -n keda
133
135
```
134
136
135
137
1. Establish a federated credential between the service account and the user assigned identity. The federated credential allows the service account to use the user assigned identity to authenticate with Azure.
@@ -145,7 +147,14 @@ This article walks you through the steps to integrate KEDA into your AKS cluster
145
147
146
148
KEDA can be deployed using YAML manifests, Helm charts, or Operator Hub. This article uses Helm charts. For more information on deploying KEDA, see [Deploying KEDA](https://keda.sh/docs/2.10/deploy/)
0 commit comments