Skip to content

Commit ab130f6

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into peeringserviceupdate
2 parents 30a060d + 37c95ae commit ab130f6

29 files changed

+684
-54
lines changed

articles/aks/uptime-sla.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Azure Kubernetes Service (AKS) with Uptime SLA
33
description: Learn about the optional Uptime SLA offering for the Azure Kubernetes Service (AKS) API Server.
44
services: container-service
55
ms.topic: conceptual
6-
ms.date: 05/11/2020
6+
ms.date: 05/19/2020
77
---
88

99
# Azure Kubernetes Service (AKS) Uptime SLA
@@ -15,7 +15,7 @@ Customers needing an SLA to meet compliance requirements or require extending an
1515
Customers can still create unlimited free clusters with a service level objective (SLO) of 99.5% and opt for the preferred SLO or SLA Uptime as needed.
1616

1717
> [!Important]
18-
> For clusters with egress lockdown, see [limit egress traffic](limit-egress-traffic.md) to open appropriate ports for Uptime SLA.
18+
> For clusters with egress lockdown, see [limit egress traffic](limit-egress-traffic.md) to open appropriate ports.
1919
2020
## SLA terms and conditions
2121

@@ -65,6 +65,7 @@ After a few minutes, the command completes and returns JSON-formatted informatio
6565

6666
* Currently, cannot convert as existing cluster to enable the Uptime SLA.
6767
* Currently, there is no way to remove Uptime SLA from an AKS cluster after creation with it enabled.
68+
* Private clusters aren't currently supported.
6869

6970
## Next steps
7071

articles/azure-arc/kubernetes/connect-cluster.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ az provider show -n Microsoft.Kubernetes -o table
6565
az provider show -n Microsoft.KubernetesConfiguration -o table
6666
```
6767

68-
## Install CLI extensions
68+
## Install Azure CLI extensions
6969

7070
Install the `connectedk8s` extension, which helps you connect Kubernetes clusters to Azure:
7171

@@ -199,7 +199,7 @@ Azure Arc enabled Kubernetes consists of a few agents (operators) that run in yo
199199

200200
## Delete a connected cluster
201201

202-
You can delete a `Microsoft.Kubernetes/connectedcluster` resource using the CLI or Azure portal.
202+
You can delete a `Microsoft.Kubernetes/connectedcluster` resource using the Azure CLI or Azure portal.
203203

204204
The Azure CLI command `az connectedk8s delete` removes the `Microsoft.Kubernetes/connectedCluster` resource in Azure. The Azure CLI deletes any associated `sourcecontrolconfiguration` resources in Azure. The Azure CLI uses helm uninstall to remove the agents in the cluster.
205205

articles/azure-arc/kubernetes/create-onboarding-service-principal.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,12 +15,12 @@ keywords: "Kubernetes, Arc, Azure, containers"
1515

1616
## Overview
1717

18-
When a cluster is onboarded to Azure, the agents running in your cluster must authenticate to Azure Resource Manager as part of registration. The `connectedk8s` CLI extension has automated Service Principal creation. However, there may be a few scenarios where the CLI automation does not work:
18+
When a cluster is onboarded to Azure, the agents running in your cluster must authenticate to Azure Resource Manager as part of registration. The `connectedk8s` Azure CLI extension has automated Service Principal creation. However, there may be a few scenarios where the CLI automation does not work:
1919

2020
* Your organization generally restricts the creation of Service Principals
2121
* The user onboarding the cluster does not have sufficient permissions to create Service Principals
2222

23-
Instead, let's create the Service Principal out of band, and then pass the principal to the CLI extension.
23+
Instead, let's create the Service Principal out of band, and then pass the principal to the Azure CLI extension.
2424

2525
## Create a new Service Principal
2626

@@ -77,7 +77,7 @@ az role assignment create \
7777
}
7878
```
7979

80-
## Use Service Principal with CLI
80+
## Use Service Principal with the Azure CLI
8181

8282
Reference the newly created Service Principal:
8383

articles/azure-arc/kubernetes/deploy-azure-iot-edge-workloads.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ keywords: "Kubernetes, Arc, Azure, K8s, containers"
1818

1919
Azure Arc and Azure IoT Edge complement each other's capabilities quite well. Azure Arc provides mechanisms for cluster operators to the configure the foundational components of a cluster as well as apply and enforce cluster policies. And IoT Edge allows application operators to remotely deploy and manage the workloads at scale with convenient cloud ingestion and bi-directional communication primitives. The diagram below illustrates this:
2020

21-
![](./media/edge-arc.png)
21+
![IoT Arc configuration](./media/edge-arc.png)
2222

2323
## Pre-requisites
2424

@@ -34,7 +34,7 @@ Azure Arc and Azure IoT Edge complement each other's capabilities quite well. Az
3434
$ kubectl create secret generic dcs --from-file=fully-qualified-path-to-values.yaml --namespace iotedge
3535
```
3636
37-
>You can also set this up remotely using the [cluster config example](./use-gitops-connected-cluster.md).
37+
You can also set this up remotely using the [cluster config example](./use-gitops-connected-cluster.md).
3838
3939
## Connect a cluster
4040

articles/azure-arc/kubernetes/deploy-azure-monitor-for-containers.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Onboard [Azure Monitor enabled containers](https://docs.microsoft.com/azure/azur
1717

1818
## Before you begin
1919

20-
* Kubernetes versions: https://docs.microsoft.com/azure/aks/supported-kubernetes-versions
20+
* [Kubernetes versions](https://docs.microsoft.com/azure/aks/supported-kubernetes-versions)
2121
* Linux distros for the cluster (master & worker) nodes – Ubuntu (18.04 LTS and 16.04 LTS)
2222
* Minimum Contributor RBAC role permission on the Azure subscription of the Azure Arc enabled Kubernetes cluster
2323
* Fully Qualified Azure Resource ID of the Azure Arc enabled Kubernetes cluster
@@ -91,11 +91,11 @@ Refer to https://docs.microsoft.com/azure/azure-monitor/insights/container-insig
9191

9292
## User interface
9393

94-
Navigate to https://aka.ms/azmon-containers-azurearc to view the Onboarded Cluster
94+
Navigate to https://aka.ms/azmon-containers-azurearc to view the Onboarded Cluster.
9595

9696
## Disable Monitoring
9797

98-
If you would like to disable monitoring due to some reason, you can just simply delete the Azure Monitor for containers HELM chart to stop collecting and ingesting monitoring data to Azure Monitor for containers backend
98+
If you would like to disable monitoring due to some reason, you can just simply delete the Azure Monitor for containers HELM chart to stop collecting and ingesting monitoring data to Azure Monitor for containers backend.
9999

100100
```console
101101
helm del azmon-containers-release-1
-260 KB
Loading

articles/azure-arc/kubernetes/troubleshooting.md

Lines changed: 5 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,11 @@ keywords: "Kubernetes, Arc, Azure, containers"
1313

1414
# Azure Arc enabled Kubernetes troubleshooting (Preview)
1515

16+
This document provides some common troubleshooting scenarios with connectivity, permissions, and agents.
17+
1618
## General troubleshooting
1719

18-
### az CLI setup
20+
### Azure CLI set up
1921
Before using az connectedk8s or az k8sconfiguration CLI commands, assure that az is set to work against the correct Azure subscription.
2022

2123
```console
@@ -65,7 +67,7 @@ Connecting clusters to Azure requires access to both an Azure subscription and `
6567

6668
### Insufficient cluster permissions
6769

68-
If the provided kubeconfig file does not have sufficient permissions to install the Azure Arc agents, the CLI command will return an error attempting to call the Kubernetes API.
70+
If the provided kubeconfig file does not have sufficient permissions to install the Azure Arc agents, the Azure CLI command will return an error attempting to call the Kubernetes API.
6971

7072
```console
7173
$ az connectedk8s connect --resource-group AzureArc --name AzureArcCluster
@@ -80,7 +82,7 @@ Cluster owner should use a Kubernetes user with cluster administrator permission
8082

8183
### Installation timeouts
8284

83-
Azure Arc agent installation requires running a set of containers on the target cluster. If the cluster is running over a slow internet connection the container image pull may take longer than the CLI timeouts.
85+
Azure Arc agent installation requires running a set of containers on the target cluster. If the cluster is running over a slow internet connection the container image pull may take longer than the Azure CLI timeouts.
8486

8587
```console
8688
$ az connectedk8s connect --resource-group AzureArc --name AzureArcCluster
@@ -195,9 +197,3 @@ metadata:
195197
resourceVersion: ""
196198
selfLink: ""
197199
```
198-
199-
### Source control configurations remain on my cluster
200-
201-
## Next steps
202-
203-
* [Use Azure Policy to govern cluster configuration](./use-azure-policy.md)

articles/azure-arc/kubernetes/use-azure-policy.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ If you are using multiple Git repos as the sources of truth for each cluster (fo
2929
6. In the **Policy rule** edit box, copy/paste the contents of this [example policy definition](https://raw.githubusercontent.com/Azure/arc-k8s-demo/master/policy/Ensure-GitOps-configuration-for-Kubernetes-cluster.json).
3030
7. **Save**.
3131

32-
Note that this step of creating a custom policy definition will not be needed once the work is completed to make this a built-in policy.
32+
This step for creating a custom policy definition will not be needed once the work is completed to make this a built-in policy.
3333

3434
## Create a policy assignment
3535

@@ -40,12 +40,12 @@ Note that this step of creating a custom policy definition will not be needed on
4040
5. If you want to exclude any resources from the policy scope, then set **Exclusions**.
4141
6. Give the policy assignment a **Name** and **Description** that you can use to identify it easily.
4242
7. Ensure that **Policy enforcement** is set to *Enabled*.
43-
8. Click **Next**.
43+
8. Select **Next**.
4444
9. Set parameter values that will be used during the creation of the `sourceControlConfiguration`.
45-
10. Click **Next**.
45+
10. Select **Next**.
4646
11. Enable **Create a remediation task**.
4747
12. Assure that **Create a managed identity** is checked, and that the identity will have **Contributor** permissions. See [this doc](https://docs.microsoft.com/azure/governance/policy/assign-policy-portal) and [the comment in this doc](https://docs.microsoft.com/azure/governance/policy/how-to/remediate-resources) for more information on the permissions you need.
48-
13. **Review + create**
48+
13. Select **Review + create**.
4949

5050
After the policy assignment is created, for any new `connectedCluster` resource (or `managedCluster` resource with the GitOps agents installed) that is located within the scope of the assignment, the `sourceControlConfiguration` will be applied. For existing clusters, you will need to manually run a remediation task. It typically takes from 10-20 minutes for the policy assignment to take effect.
5151

articles/azure-arc/kubernetes/use-gitops-connected-cluster.md

Lines changed: 19 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,6 @@ keywords: "GitOps, Kubernetes, K8s, Azure, Arc, Azure Kubernetes Service, contai
1313

1414
# Use GitOps for an Azure Arc-enabled configuration (Preview)
1515

16-
## Overview
17-
1816
This architecture uses a GitOps workflow to configure the cluster and deploy applications. The configuration is described declaratively in .yaml files and stored in Git. An agent watches the Git repo for changes and applies them. The same agent also periodically assures that the cluster state matches the state declared in the Git repo and returns the cluster to the desired state if any unmanaged changes have occurred.
1917

2018
The connection between your cluster and one or more Git repositories is tracked in Azure Resource Manager as a `sourceControlConfiguration` extension resource. The `sourceControlConfiguration` resource properties represent where and how Kubernetes resources should flow from Git to your cluster. The `sourceControlConfiguration` data is stored encrypted at rest in a CosmosDb database to ensure data confidentiality.
@@ -33,14 +31,12 @@ This getting started guide will walk you through applying a set of configuration
3331

3432
The example repository is structured around the persona of a cluster operator who would like to provision a few namespaces, deploy a common workload, and provide some team-specific configuration. Using this repository creates the following resources on your cluster:
3533

36-
* **Namespaces:** `cluster-config`, `team-a`, `team-b`
37-
* **Deployment:** `cluster-config/azure-vote`
38-
* **ConfigMap:** `team-a/endpoints`
39-
40-
### Notes
34+
**Namespaces:** `cluster-config`, `team-a`, `team-b`
35+
**Deployment:** `cluster-config/azure-vote`
36+
**ConfigMap:** `team-a/endpoints`
4137

42-
* The `config-agent` polls Azure for new or updated `sourceControlConfiguration` every 30 seconds. This is the maximum time it will take for the `config-agent` to pick up a new or updated configuration.
43-
* If you are associating a private repository, assure that you also complete the steps in [Apply configuration from a private git repository](https://github.com/Azure/azure-arc-kubernetes-preview/blob/master/docs/use-gitops-in-connected-cluster.md#apply-configuration-from-a-private-git-repository)
38+
The `config-agent` polls Azure for new or updated `sourceControlConfiguration` every 30 seconds. This is the maximum time it will take for the `config-agent` to pick up a new or updated configuration.
39+
If you are associating a private repository, assure that you also complete the steps in [Apply configuration from a private git repository](https://github.com/Azure/azure-arc-kubernetes-preview/blob/master/docs/use-gitops-in-connected-cluster.md#apply-configuration-from-a-private-git-repository)
4440

4541
### Using Azure CLI
4642

@@ -102,13 +98,13 @@ Here are the supported scenarios for the value of --repository-url parameter.
10298
| Scenario | Format | Description |
10399
| ------------- | ------------- | ------------- |
104100
| Private GitHub repo - SSH | [email protected]:username/repo | SSH keypair generated by Flux. User must add the public key to the GitHub account as Deploy Key. |
105-
| Public GitHub repo | http://github.com/username/repo or git://github.com/username/repo | Public Git repo |
101+
| Public GitHub repo | `http://github.com/username/repo` or git://github.com/username/repo | Public Git repo |
106102

107103
These scenarios are supported by Flux but not by sourceControlConfiguration yet.
108104

109105
| Scenario | Format | Description |
110106
| ------------- | ------------- | ------------- |
111-
| Private GitHub repo - HTTPS | https://github.com/username/repo | Flux does not generate SSH keypair. [Instructions](https://docs.fluxcd.io/en/1.17.0/guides/use-git-https.html) |
107+
| Private GitHub repo - HTTPS | `https://github.com/username/repo` | Flux does not generate SSH keypair. [Instructions](https://docs.fluxcd.io/en/1.17.0/guides/use-git-https.html) |
112108
| Private Git host | user@githost:path/to/repo | [Instructions](https://docs.fluxcd.io/en/1.18.0/guides/use-private-git-host.html) |
113109
| Private GitHub repo - SSH (bring your own key) | [email protected]:username/repo | [Use your own SSH keypair](https://docs.fluxcd.io/en/1.17.0/guides/provide-own-ssh-key.html) |
114110

@@ -129,17 +125,17 @@ To customize the creation of configuration, here are a few additional parameters
129125

130126
Options supported in --operator-params
131127

132-
| | Option | Description |
133-
| ------------- | ------------- | ------------- |
134-
| 1. | --git-branch | Branch of git repo to use for Kubernetes manifests. Default is 'master'. |
135-
| 2. | --git-path | Relative path within the Git repo for Flux to locate Kubernetes manifests. |
136-
| 3. | --git-readonly | Git repo will be considered read-only; Flux will not attempt to write to it. |
137-
| 4. | --manifest-generation | If enabled, Flux will look for .flux.yaml and run Kustomize or other manifest generators. |
138-
| 5. | --git-poll-interval | Period at which to poll Git repo for new commits. Default is '5m' (5 minutes). |
139-
| 6. | --sync-garbage-collection | If enabled, Flux will delete resources that it created, but are no longer present in Git. |
140-
| 7. | --git-label | Label to keep track of sync progress, used to tag the Git branch. Default is 'flux-sync'. |
141-
| 8. | --git-user | Username for git commit. |
142-
| 9. | --git-email | Email to use for git commit. |
128+
| Option | Description |
129+
| ------------- | ------------- |
130+
| --git-branch | Branch of git repo to use for Kubernetes manifests. Default is 'master'. |
131+
| --git-path | Relative path within the Git repo for Flux to locate Kubernetes manifests. |
132+
| --git-readonly | Git repo will be considered read-only; Flux will not attempt to write to it. |
133+
| --manifest-generation | If enabled, Flux will look for .flux.yaml and run Kustomize or other manifest generators. |
134+
| --git-poll-interval | Period at which to poll Git repo for new commits. Default is '5m' (5 minutes). |
135+
| --sync-garbage-collection | If enabled, Flux will delete resources that it created, but are no longer present in Git. |
136+
| --git-label | Label to keep track of sync progress, used to tag the Git branch. Default is 'flux-sync'. |
137+
| --git-user | Username for git commit. |
138+
| --git-email | Email to use for git commit. |
143139

144140
* If '--git-user' or '--git-email' are not set (which means that you don't want Flux to write to the repo), then --git-readonly will automatically be set (if you have not already set it).
145141

@@ -292,7 +288,7 @@ kubectl -n itops get all
292288

293289
## Delete a configuration
294290

295-
You can delete a `sourceControlConfiguration` using the CLI or Azure portal. After you initiate the delete command, the `sourceControlConfiguration` resource will be deleted immediately in Azure, but it can take up to 1 hour for full deletion of the associated objects from the cluster (we have a backlog item to shorten this). If the `sourceControlConfiguration` was created with namespace scope, that namespace will not be deleted from the cluster (to avoid breaking any other resources that may have been created in that namespace).
291+
You can delete a `sourceControlConfiguration` using the Azure CLI or Azure portal. After you initiate the delete command, the `sourceControlConfiguration` resource will be deleted immediately in Azure, but it can take up to 1 hour for full deletion of the associated objects from the cluster (we have a backlog item to shorten this). If the `sourceControlConfiguration` was created with namespace scope, that namespace will not be deleted from the cluster (to avoid breaking any other resources that may have been created in that namespace).
296292

297293
Note that any changes to the cluster that were the result of deployments from the tracked git repo are not deleted when the `sourceControlConfiguration` is deleted.
298294

0 commit comments

Comments
 (0)