Skip to content

Commit a40ab12

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into retry-go
2 parents 7b51c42 + 6ddd5ed commit a40ab12

File tree

196 files changed

+1447
-682
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

196 files changed

+1447
-682
lines changed

articles/ai-services/content-safety/studio-quickstart.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,7 @@ In this quickstart, get started with the Azure AI Content Safety service using C
2323

2424
* An active Azure account. If you don't have one, you can [create one for free](https://azure.microsoft.com/free/cognitive-services/).
2525
* A [Content Safety](https://aka.ms/acs-create) Azure resource.
26+
* The `Cognitive Services User` role assigned to the Content Safety resource in the desired Azure subscription.
2627
* Sign in to [Content Safety Studio](https://contentsafety.cognitive.azure.com) with your Azure subscription and Content Safety resource.
2728

2829

articles/ai-services/openai/concepts/gpt-with-vision.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ For a typical use case, take an image with both visible objects and text and a 1
8181
| Item | Detail | Cost |
8282
|-----------------|-----------------|--------------|
8383
| Text prompt input | 100 text tokens | $0.001 |
84-
| Example image input (see [Image tokens](/ai-services/openai/overview#image-tokens-gpt-4-turbo-with-vision)) | 170 + 85 image tokens | $0.00255 |
84+
| Example image input (see [Image tokens](/azure/ai-services/openai/overview#image-tokens-gpt-4-turbo-with-vision)) | 170 + 85 image tokens | $0.00255 |
8585
| Enhanced add-on features for OCR | $1.50 / 1000 transactions | $0.0015 |
8686
| Enhanced add-on features for Object Grounding | $1.50 / 1000 transactions | $0.0015 |
8787
| Output Tokens | 100 tokens (assumed) | $0.003 |

articles/aks/app-routing-nginx-configuration.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -551,3 +551,4 @@ Learn about monitoring the ingress-nginx controller metrics included with the ap
551551
[azure-dns-overview]: ../dns/dns-overview.md
552552
[az-keyvault-certificate-show]: /cli/azure/keyvault/certificate#az-keyvault-certificate-show
553553
[prometheus-in-grafana]: app-routing-nginx-prometheus.md
554+
[az-role-assignment-create]: /cli/azure/role/assignment#az-role-assignment-create

articles/aks/configure-azure-cni-static-block-allocation.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ location="myRegion"
149149
az group create --name $resourceGroup --location $location
150150
151151
# Create our two subnet network
152-
az network vnet create -resource-group $resourceGroup --location $location --name $vnet --address-prefixes 10.0.0.0/8 -o none
152+
az network vnet create --resource-group $resourceGroup --location $location --name $vnet --address-prefixes 10.0.0.0/8 -o none
153153
az network vnet subnet create --resource-group $resourceGroup --vnet-name $vnet --name nodesubnet --address-prefixes 10.240.0.0/16 -o none
154154
az network vnet subnet create --resource-group $resourceGroup --vnet-name $vnet --name podsubnet --address-prefixes 10.40.0.0/13 -o none
155155
```
@@ -171,7 +171,6 @@ az aks create \
171171
--vnet-subnet-id /subscriptions/$subscription/resourceGroups/$resourceGroup/providers/Microsoft.Network/virtualNetworks/$vnet/subnets/nodesubnet \
172172
--pod-subnet-id /subscriptions/$subscription/resourceGroups/$resourceGroup/providers/Microsoft.Network/virtualNetworks/$vnet/subnets/podsubnet \
173173
--enable-addons monitoring \
174-
--kubernetes-version 1.28 \
175174
--generate-ssh-keys
176175
```
177176

articles/aks/istio-upgrade.md

Lines changed: 32 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ ms.service: azure-kubernetes-service
66
ms.date: 05/04/2023
77
ms.author: shasb
88
author: shashankbarsin
9+
ms.custom: devx-track-azurecli
910
---
1011

1112
# Upgrade Istio-based service mesh add-on for Azure Kubernetes Service
@@ -20,27 +21,27 @@ Istio add-on allows upgrading the minor revision using [canary upgrade process][
2021

2122
If the cluster is currently using a supported minor revision of Istio, upgrades are only allowed one minor revision at a time. If the cluster is using an unsupported revision of Istio, you must upgrade to the lowest supported minor revision of Istio for that Kubernetes version. After that, upgrades can again be done one minor revision at a time.
2223

23-
The following example illustrates how to upgrade from revision `asm-1-18` to `asm-1-19`. The steps are the same for all minor upgrades.
24+
The following example illustrates how to upgrade from revision `asm-1-20` to `asm-1-21`. The steps are the same for all minor upgrades.
2425

2526
1. Use the [az aks mesh get-upgrades](/cli/azure/aks/mesh#az-aks-mesh-get-upgrades) command to check which revisions are available for the cluster as upgrade targets:
2627

27-
```bash
28+
```azurecli-interactive
2829
az aks mesh get-upgrades --resource-group $RESOURCE_GROUP --name $CLUSTER
2930
```
3031
3132
If you expect to see a newer revision not returned by this command, you may need to upgrade your AKS cluster first so that it's compatible with the newest revision.
3233
3334
1. If you've set up [mesh configuration][meshconfig] for the existing mesh revision on your cluster, you need to create a separate ConfigMap corresponding to the new revision in the `aks-istio-system` namespace **before initiating the canary upgrade** in the next step. This configuration is applicable the moment the new revision's control plane is deployed on cluster. More details can be found [here][meshconfig-canary-upgrade].
3435
35-
1. Initiate a canary upgrade from revision `asm-1-18` to `asm-1-19` using [az aks mesh upgrade start](/cli/azure/aks/mesh#az-aks-mesh-upgrade-start):
36+
1. Initiate a canary upgrade from revision `asm-1-20` to `asm-1-21` using [az aks mesh upgrade start](/cli/azure/aks/mesh/upgrade#az-aks-mesh-upgrade-start):
3637
37-
```bash
38-
az aks mesh upgrade start --resource-group $RESOURCE_GROUP --name $CLUSTER --revision asm-1-19
38+
```azurecli-interactive
39+
az aks mesh upgrade start --resource-group $RESOURCE_GROUP --name $CLUSTER --revision asm-1-21
3940
```
4041
41-
A canary upgrade means the 1.18 control plane is deployed alongside the 1.17 control plane. They continue to coexist until you either complete or roll back the upgrade.
42+
A canary upgrade means the 1.20 control plane is deployed alongside the 1.21 control plane. They continue to coexist until you either complete or roll back the upgrade.
4243
43-
1. Verify control plane pods corresponding to both `asm-1-18` and `asm-1-19` exist:
44+
1. Verify control plane pods corresponding to both `asm-1-20` and `asm-1-21` exist:
4445
4546
* Verify `istiod` pods:
4647
@@ -52,10 +53,10 @@ The following example illustrates how to upgrade from revision `asm-1-18` to `as
5253
5354
```
5455
NAME READY STATUS RESTARTS AGE
55-
istiod-asm-1-18-55fccf84c8-dbzlt 1/1 Running 0 58m
56-
istiod-asm-1-18-55fccf84c8-fg8zh 1/1 Running 0 58m
57-
istiod-asm-1-19-f85f46bf5-7rwg4 1/1 Running 0 51m
58-
istiod-asm-1-19-f85f46bf5-8p9qx 1/1 Running 0 51m
56+
istiod-asm-1-20-55fccf84c8-dbzlt 1/1 Running 0 58m
57+
istiod-asm-1-20-55fccf84c8-fg8zh 1/1 Running 0 58m
58+
istiod-asm-1-21-f85f46bf5-7rwg4 1/1 Running 0 51m
59+
istiod-asm-1-21-f85f46bf5-8p9qx 1/1 Running 0 51m
5960
```
6061
6162
* If ingress is enabled, verify ingress pods:
@@ -68,22 +69,22 @@ The following example illustrates how to upgrade from revision `asm-1-18` to `as
6869
6970
```
7071
NAME READY STATUS RESTARTS AGE
71-
aks-istio-ingressgateway-external-asm-1-18-58f889f99d-qkvq2 1/1 Running 0 59m
72-
aks-istio-ingressgateway-external-asm-1-18-58f889f99d-vhtd5 1/1 Running 0 58m
73-
aks-istio-ingressgateway-external-asm-1-19-7466f77bb9-ft9c8 1/1 Running 0 51m
74-
aks-istio-ingressgateway-external-asm-1-19-7466f77bb9-wcb6s 1/1 Running 0 51m
75-
aks-istio-ingressgateway-internal-asm-1-18-579c5d8d4b-4cc2l 1/1 Running 0 58m
76-
aks-istio-ingressgateway-internal-asm-1-18-579c5d8d4b-jjc7m 1/1 Running 0 59m
77-
aks-istio-ingressgateway-internal-asm-1-19-757d9b5545-g89s4 1/1 Running 0 51m
78-
aks-istio-ingressgateway-internal-asm-1-19-757d9b5545-krq9w 1/1 Running 0 51m
72+
aks-istio-ingressgateway-external-asm-1-20-58f889f99d-qkvq2 1/1 Running 0 59m
73+
aks-istio-ingressgateway-external-asm-1-20-58f889f99d-vhtd5 1/1 Running 0 58m
74+
aks-istio-ingressgateway-external-asm-1-21-7466f77bb9-ft9c8 1/1 Running 0 51m
75+
aks-istio-ingressgateway-external-asm-1-21-7466f77bb9-wcb6s 1/1 Running 0 51m
76+
aks-istio-ingressgateway-internal-asm-1-20-579c5d8d4b-4cc2l 1/1 Running 0 58m
77+
aks-istio-ingressgateway-internal-asm-1-20-579c5d8d4b-jjc7m 1/1 Running 0 59m
78+
aks-istio-ingressgateway-internal-asm-1-21-757d9b5545-g89s4 1/1 Running 0 51m
79+
aks-istio-ingressgateway-internal-asm-1-21-757d9b5545-krq9w 1/1 Running 0 51m
7980
```
8081
8182
Observe that ingress gateway pods of both revisions are deployed side-by-side. However, the service and its IP remain immutable.
8283
8384
1. Relabel the namespace so that any new pods get the Istio sidecar associated with the new revision and its control plane:
8485
8586
```bash
86-
kubectl label namespace default istio.io/rev=asm-1-19 --overwrite
87+
kubectl label namespace default istio.io/rev=asm-1-21 --overwrite
8788
```
8889
8990
Relabeling doesn't affect your workloads until they're restarted.
@@ -98,7 +99,7 @@ The following example illustrates how to upgrade from revision `asm-1-18` to `as
9899
99100
* **Complete the canary upgrade**: If you're satisfied that the workloads are all running in a healthy state as expected, you can complete the canary upgrade. Completion of the upgrade removes the previous revision's control plane and leaves behind the new revision's control plane on the cluster. Run the following command to complete the canary upgrade:
100101
101-
```bash
102+
```azurecli-interactive
102103
az aks mesh upgrade complete --resource-group $RESOURCE_GROUP --name $CLUSTER
103104
```
104105
@@ -107,7 +108,7 @@ The following example illustrates how to upgrade from revision `asm-1-18` to `as
107108
* Relabel the namespace to the previous revision:
108109
109110
```bash
110-
kubectl label namespace default istio.io/rev=asm-1-18 --overwrite
111+
kubectl label namespace default istio.io/rev=asm-1-20 --overwrite
111112
```
112113
113114
* Roll back the workloads to use the sidecar corresponding to the previous Istio revision by restarting these workloads again:
@@ -118,7 +119,7 @@ The following example illustrates how to upgrade from revision `asm-1-18` to `as
118119
119120
* Roll back the control plane to the previous revision:
120121
121-
```
122+
```azurecli-interactive
122123
az aks mesh upgrade rollback --resource-group $RESOURCE_GROUP --name $CLUSTER
123124
```
124125
@@ -147,8 +148,8 @@ Thus, during the canary upgrade, when two revisions exist simultaneously on the
147148
Example output:
148149
149150
```bash
150-
"image": "mcr.microsoft.com/oss/istio/proxyv2:1.18.2-distroless",
151-
"image": "mcr.microsoft.com/oss/istio/proxyv2:1.18.2-distroless"
151+
"image": "mcr.microsoft.com/oss/istio/proxyv2:1.20.6-distroless",
152+
"image": "mcr.microsoft.com/oss/istio/proxyv2:1.20.6-distroless"
152153
```
153154
154155
* Check the Istio proxy image version for all pods in a namespace:
@@ -162,7 +163,7 @@ Thus, during the canary upgrade, when two revisions exist simultaneously on the
162163
Example output:
163164
164165
```bash
165-
productpage-v1-979d4d9fc-p4764: docker.io/istio/examples-bookinfo-productpage-v1:1.18.0, mcr.microsoft.com/oss/istio/proxyv2:1.18.1-distroless
166+
productpage-v1-979d4d9fc-p4764: docker.io/istio/examples-bookinfo-productpage-v1:1.20.0, mcr.microsoft.com/oss/istio/proxyv2:1.20.6-distroless
166167
```
167168
168169
* To trigger reinjection, restart the workloads. For example:
@@ -182,11 +183,15 @@ Thus, during the canary upgrade, when two revisions exist simultaneously on the
182183
Example output:
183184
184185
```bash
185-
productpage-v1-979d4d9fc-p4764: docker.io/istio/examples-bookinfo-productpage-v1:1.18.0, mcr.microsoft.com/oss/istio/proxyv2:1.18.2-distroless
186+
productpage-v1-979d4d9fc-p4764: docker.io/istio/examples-bookinfo-productpage-v1:1.20.0, mcr.microsoft.com/oss/istio/proxyv2:1.20.7-distroless
186187
```
187188
189+
> [!NOTE]
190+
> In case of any issues encountered during upgrades, refer to [article on troubleshooting mesh revision upgrades][upgrade-istio-service-mesh-tsg]
191+
188192
[aks-release-notes]: https://github.com/Azure/AKS/releases
189193
[istio-canary-upstream]: https://istio.io/latest/docs/setup/upgrade/canary/
190194
[meshconfig]: ./istio-meshconfig.md
191195
[meshconfig-canary-upgrade]: ./istio-meshconfig.md#mesh-configuration-and-upgrades
196+
[upgrade-istio-service-mesh-tsg]: /troubleshoot/azure/azure-kubernetes/extensions/istio-add-on-minor-revision-upgrade
192197
31.5 KB
Loading

articles/aks/monitor-aks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ For more information on the difference between collection modes including how to
103103
> The ability to select the collection mode isn't available in the Azure portal in all regions yet. For those regions where it's not yet available, use CLI to create the diagnostic setting with a command such as the following:
104104
>
105105
> ```azurecli
106-
> az monitor diagnostic-settings create --name AKS-Diagnostics --resource /subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/myresourcegroup/providers/Microsoft.ContainerService/managedClusters/my-cluster --logs '[{""category"": ""kube-audit"",""enabled"": true}, {""category"": ""kube-audit-admin"", ""enabled"": true}, {""category"": ""kube-apiserver"", ""enabled"": true}, {""category"": ""kube-controller-manager"", ""enabled"": true}, {""category"": ""kube-scheduler"", ""enabled"": true}, {""category"": ""cluster-autoscaler"", ""enabled"": true}, {""category"": ""cloud-controller-manager"", ""enabled"": true}, {""category"": ""guard"", ""enabled"": true}, {""category"": ""csi-azuredisk-controller"", ""enabled"": true}, {""category"": ""csi-azurefile-controller"", ""enabled"": true}, {""category"": ""csi-snapshot-controller"", ""enabled"": true}]' --workspace /subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourcegroups/myresourcegroup/providers/microsoft.operationalinsights/workspaces/myworkspace --export-to-resource-specific true
106+
> az monitor diagnostic-settings create --name AKS-Diagnostics --resource /subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/myresourcegroup/providers/Microsoft.ContainerService/managedClusters/my-cluster --logs '[{"category": "kube-audit","enabled": true}, {"category": "kube-audit-admin", "enabled": true}, {"category": "kube-apiserver", "enabled": true}, {"category": "kube-controller-manager", "enabled": true}, {"category": "kube-scheduler", "enabled": true}, {"category": "cluster-autoscaler", "enabled": true}, {"category": "cloud-controller-manager", "enabled": true}, {"category": "guard", "enabled": true}, {"category": "csi-azuredisk-controller", "enabled": true}, {"category": "csi-azurefile-controller", "enabled": true}, {"category": "csi-snapshot-controller", "enabled": true}]' --workspace /subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourcegroups/myresourcegroup/providers/microsoft.operationalinsights/workspaces/myworkspace --export-to-resource-specific true
107107
> ```
108108
109109
#### Sample log queries

articles/aks/use-kms-etcd-encryption.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use Key Management Service (KMS) etcd encryption with
44
ms.topic: article
55
ms.subservice: aks-security
66
ms.custom: devx-track-azurecli
7-
ms.date: 06/19/2024
7+
ms.date: 06/26/2024
88
---
99

1010
# Add Key Management Service etcd encryption to an Azure Kubernetes Service cluster
@@ -191,7 +191,7 @@ After you change the key ID (including changing either the key name or the key v
191191
> [!WARNING]
192192
> Remember to update all secrets after key rotation. If you don't update all secrets, the secrets are inaccessible if the keys that were created earlier don't exist or no longer work.
193193
>
194-
> After you rotate the key, the previous key (key1) is still cached and shouldn't be deleted. If you want to delete the previous key (key1) immediately, you need to rotate the key twice. Then key2 and key3 are cached, and key1 can be deleted without affecting the existing cluster.
194+
> KMS uses 2 keys at the same time. After the first key rotation, you need to ensure both the old and new keys are valid (not expired) until the next key rotation. After the second key rotation, the oldest key can be safely removed/expired
195195
196196
```azurecli-interactive
197197
az aks update --name myAKSCluster --resource-group MyResourceGroup --enable-azure-keyvault-kms --azure-keyvault-kms-key-vault-network-access "Public" --azure-keyvault-kms-key-id $NEW_KEY_ID
@@ -336,7 +336,7 @@ kubectl get secrets --all-namespaces -o json | kubectl replace -f -
336336
> [!NOTE]
337337
> To change a different key vault with a different mode (whether public or private), you can run `az aks update` directly. To change the mode of an attached key vault, you must first turn off KMS, and then turn it on again by using the new key vault IDs.
338338
339-
The following sections describe how to migrate an attached public key vault to private mode.
339+
The following sections describe how to migrate an attached public key vault to private mode. These steps can also be used for migrating from private to public.
340340

341341
### Turn off KMS on the cluster
342342

@@ -354,6 +354,8 @@ Update the key vault from public to private:
354354
az keyvault update --name MyKeyVault --resource-group MyResourceGroup --public-network-access Disabled
355355
```
356356

357+
To migrate from private to public set `--public-network-access` to `Enabled` in the command above.
358+
357359
### Turn on KMS for the cluster by using the updated key vault
358360

359361
Turn on KMS by using the updated private key vault:

articles/aks/windows-aks-customer-stories.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,11 +16,22 @@ Explore how various industries are using Windows Containers on Azure Kubernetes
1616
Learn directly from the customer stories listed here.
1717

1818
## Customer stories
19+
- [Finastra](#finastra)
1920
- [Relativity](#relativity)
2021
- [Duck Creek](#duck-creek)
2122
- [Forza (Xbox Game Studios)](#forza)
2223
- [Microsoft Experience + Devices](#microsoft-experience--devices)
2324

25+
26+
### Finastra
27+
28+
![Logo of Finastra.](./media/windows-aks-customer-stories/finastra.png)
29+
30+
LaserPro document management software is key to the Finastra vision of delivering the future of banking. Migrating from an on-premises management system to a cloud-based infrastructure using Windows containers on Azure Kubernetes Service has significantly increased agility through biweekly updates and reduced support costs for both customers and developers.
31+
32+
For more information visit [Finastra's Windows AKS customer story](https://customers.microsoft.com/en-us/story/1759082810297807726-finastra-azure-kubernetes-service-professional-services-en-united-kingdom).
33+
34+
2435
### Relativity
2536

2637
![Logo of Relativity.](./media/windows-aks-customer-stories/relativity.png)

0 commit comments

Comments
 (0)