Skip to content

Commit bb8639c

Browse files
Merge pull request #236604 from msaenzbosupport/patch-11
[Doc-A-thon] Updating code block
2 parents b431040 + 7e0e14e commit bb8639c

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/aks/upgrade-windows-2019-2022.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ Once you update the nodeSelector on the YAML file, you should also update the co
5858
5959
If you have an application deployed already, follow the recommended steps to deploy a new node pool with Windows Server 2022 nodes. Once deployed, your environment will show Windows Server 2019 and 2022 nodes, with the workloads running on the 2019 nodes:
6060
61-
```console
61+
```bash
6262
kubectl get nodes -o wide
6363
```
6464
This command shows all nodes on your AKS cluster with extra details on the output:
@@ -76,7 +76,7 @@ akswspool000002 Ready agent 5h37m v1.23.8 10.240.0.
7676

7777
With the Windows Server 2022 node pool deployed and the YAML file configured, you can now deploy the new version of the YAML:
7878

79-
```console
79+
```bash
8080
kubectl apply -f <filename>
8181
```
8282

@@ -88,7 +88,7 @@ service/sample unchanged
8888
```
8989
At this point, AKS starts the process of terminating the existing pods and deploying new pods to the Windows Server 2022 nodes. You can check the status of your deployment by running:
9090

91-
```console
91+
```bash
9292
kubectl get pods -o wide
9393
```
9494
This command returns the status of the pods on the default namespace. You might need to change the command above to list the pods on specific namespaces.
@@ -104,4 +104,4 @@ sample-7794bfcc4c-sh78c 1/1 Running 0 2m49s 10.240.0.228 ak
104104

105105
If you're using Group Managed Service Accounts (gMSA), update the Managed Identity configuration for the new node pool. gMSA uses a secret (user account and password) so the node on which the Windows pod is running can authenticate the container against Active Directory. To access that secret on Azure Key Vault, the node uses a Managed Identity that allows the node to access the resource. Since Managed Identities are configured per node pool, and the pod now resides on a new node pool, you need to update that configuration. Check out [Enable Group Managed Service Accounts (GMSA) for your Windows Server nodes on your Azure Kubernetes Service (AKS) cluster](./use-group-managed-service-accounts.md) for more information.
106106

107-
The same principle applies to Managed Identities used for any other pod/node pool when accessing other Azure resources. Any access provided via Managed Identity needs to be updated to reflect the new node pool. To view update and sign-in activities, see [How to view Managed Identity activity](../active-directory/managed-identities-azure-resources/how-to-view-managed-identity-activity.md).
107+
The same principle applies to Managed Identities used for any other pod/node pool when accessing other Azure resources. Any access provided via Managed Identity needs to be updated to reflect the new node pool. To view update and sign-in activities, see [How to view Managed Identity activity](../active-directory/managed-identities-azure-resources/how-to-view-managed-identity-activity.md).

0 commit comments

Comments
 (0)