You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Upgrade Istio-based service mesh add-on for Azure Kubernetes Service
@@ -20,27 +21,27 @@ Istio add-on allows upgrading the minor revision using [canary upgrade process][
20
21
21
22
If the cluster is currently using a supported minor revision of Istio, upgrades are only allowed one minor revision at a time. If the cluster is using an unsupported revision of Istio, you must upgrade to the lowest supported minor revision of Istio for that Kubernetes version. After that, upgrades can again be done one minor revision at a time.
22
23
23
-
The following example illustrates how to upgrade from revision `asm-1-18` to `asm-1-19`. The steps are the same for all minor upgrades.
24
+
The following example illustrates how to upgrade from revision `asm-1-20` to `asm-1-21`. The steps are the same for all minor upgrades.
24
25
25
26
1. Use the [az aks mesh get-upgrades](/cli/azure/aks/mesh#az-aks-mesh-get-upgrades) command to check which revisions are available for the cluster as upgrade targets:
26
27
27
-
```bash
28
+
```azurecli-interactive
28
29
az aks mesh get-upgrades --resource-group $RESOURCE_GROUP --name $CLUSTER
29
30
```
30
31
31
32
If you expect to see a newer revision not returned by this command, you may need to upgrade your AKS cluster first so that it's compatible with the newest revision.
32
33
33
34
1. If you've set up [mesh configuration][meshconfig] for the existing mesh revision on your cluster, you need to create a separate ConfigMap corresponding to the new revision in the `aks-istio-system` namespace **before initiating the canary upgrade** in the next step. This configuration is applicable the moment the new revision's control plane is deployed on cluster. More details can be found [here][meshconfig-canary-upgrade].
34
35
35
-
1. Initiate a canary upgrade from revision `asm-1-18` to `asm-1-19` using [az aks mesh upgrade start](/cli/azure/aks/mesh#az-aks-mesh-upgrade-start):
36
+
1. Initiate a canary upgrade from revision `asm-1-20` to `asm-1-21` using [az aks mesh upgrade start](/cli/azure/aks/mesh/upgrade#az-aks-mesh-upgrade-start):
36
37
37
-
```bash
38
-
az aks mesh upgrade start --resource-group $RESOURCE_GROUP --name $CLUSTER --revision asm-1-19
38
+
```azurecli-interactive
39
+
az aks mesh upgrade start --resource-group $RESOURCE_GROUP --name $CLUSTER --revision asm-1-21
39
40
```
40
41
41
-
A canary upgrade means the 1.18 control plane is deployed alongside the 1.17 control plane. They continue to coexist until you either complete or roll back the upgrade.
42
+
A canary upgrade means the 1.20 control plane is deployed alongside the 1.21 control plane. They continue to coexist until you either complete or roll back the upgrade.
42
43
43
-
1. Verify control plane pods corresponding to both `asm-1-18` and `asm-1-19` exist:
44
+
1. Verify control plane pods corresponding to both `asm-1-20` and `asm-1-21` exist:
44
45
45
46
* Verify `istiod` pods:
46
47
@@ -52,10 +53,10 @@ The following example illustrates how to upgrade from revision `asm-1-18` to `as
Relabeling doesn't affect your workloads until they're restarted.
@@ -98,7 +99,7 @@ The following example illustrates how to upgrade from revision `asm-1-18` to `as
98
99
99
100
* **Complete the canary upgrade**: If you're satisfied that the workloads are all running in a healthy state as expected, you can complete the canary upgrade. Completion of the upgrade removes the previous revision's control plane and leaves behind the new revision's control plane on the cluster. Run the following command to complete the canary upgrade:
100
101
101
-
```bash
102
+
```azurecli-interactive
102
103
az aks mesh upgrade complete --resource-group $RESOURCE_GROUP --name $CLUSTER
103
104
```
104
105
@@ -107,7 +108,7 @@ The following example illustrates how to upgrade from revision `asm-1-18` to `as
Copy file name to clipboardExpand all lines: articles/aks/monitor-aks.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -103,7 +103,7 @@ For more information on the difference between collection modes including how to
103
103
> The ability to select the collection mode isn't available in the Azure portal in all regions yet. For those regions where it's not yet available, use CLI to create the diagnostic setting with a command such as the following:
Copy file name to clipboardExpand all lines: articles/aks/use-kms-etcd-encryption.md
+5-3Lines changed: 5 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to use Key Management Service (KMS) etcd encryption with
4
4
ms.topic: article
5
5
ms.subservice: aks-security
6
6
ms.custom: devx-track-azurecli
7
-
ms.date: 06/19/2024
7
+
ms.date: 06/26/2024
8
8
---
9
9
10
10
# Add Key Management Service etcd encryption to an Azure Kubernetes Service cluster
@@ -191,7 +191,7 @@ After you change the key ID (including changing either the key name or the key v
191
191
> [!WARNING]
192
192
> Remember to update all secrets after key rotation. If you don't update all secrets, the secrets are inaccessible if the keys that were created earlier don't exist or no longer work.
193
193
>
194
-
> After you rotate the key, the previous key (key1) is still cached and shouldn't be deleted. If you want to delete the previous key (key1) immediately, you need to rotate the key twice. Then key2 and key3 are cached, and key1 can be deleted without affecting the existing cluster.
194
+
> KMS uses 2 keys at the same time. After the first key rotation, you need to ensure both the old and new keys are valid (not expired) until the next key rotation. After the second key rotation, the oldest key can be safely removed/expired
195
195
196
196
```azurecli-interactive
197
197
az aks update --name myAKSCluster --resource-group MyResourceGroup --enable-azure-keyvault-kms --azure-keyvault-kms-key-vault-network-access "Public" --azure-keyvault-kms-key-id $NEW_KEY_ID
> To change a different key vault with a different mode (whether public or private), you can run `az aks update` directly. To change the mode of an attached key vault, you must first turn off KMS, and then turn it on again by using the new key vault IDs.
338
338
339
-
The following sections describe how to migrate an attached public key vault to private mode.
339
+
The following sections describe how to migrate an attached public key vault to private mode. These steps can also be used for migrating from private to public.
340
340
341
341
### Turn off KMS on the cluster
342
342
@@ -354,6 +354,8 @@ Update the key vault from public to private:
354
354
az keyvault update --name MyKeyVault --resource-group MyResourceGroup --public-network-access Disabled
355
355
```
356
356
357
+
To migrate from private to public set `--public-network-access` to `Enabled` in the command above.
358
+
357
359
### Turn on KMS for the cluster by using the updated key vault
358
360
359
361
Turn on KMS by using the updated private key vault:

29
+
30
+
LaserPro document management software is key to the Finastra vision of delivering the future of banking. Migrating from an on-premises management system to a cloud-based infrastructure using Windows containers on Azure Kubernetes Service has significantly increased agility through biweekly updates and reduced support costs for both customers and developers.
31
+
32
+
For more information visit [Finastra's Windows AKS customer story](https://customers.microsoft.com/en-us/story/1759082810297807726-finastra-azure-kubernetes-service-professional-services-en-united-kingdom).
33
+
34
+
24
35
### Relativity
25
36
26
37

0 commit comments