Skip to content

Commit be60271

Browse files
committed
proxy cert alias and misc changes
1 parent bad087f commit be60271

File tree

3 files changed

+12
-8
lines changed

3 files changed

+12
-8
lines changed

articles/azure-arc/kubernetes/agent-upgrade.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -88,10 +88,10 @@ Azure Arc-enabled Kubernetes follows the standard [semantic versioning scheme](h
8888

8989
While the schedule may vary, a new minor version of Azure Arc-enabled Kubernetes agents is released approximately once per month.
9090

91-
The following command upgrades the agent to version 1.1.0:
91+
The following command upgrades the agent to version 1.8.14:
9292

9393
```azurecli
94-
az connectedk8s upgrade -g AzureArcTest1 -n AzureArcTest --agent-version 1.1.0
94+
az connectedk8s upgrade -g AzureArcTest1 -n AzureArcTest --agent-version 1.8.14
9595
```
9696

9797
## Check agent version

articles/azure-arc/kubernetes/azure-rbac.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.topic: how-to
77
description: "Use Azure RBAC for authorization checks on Azure Arc-enabled Kubernetes clusters."
88
---
99

10-
# Integrate Azure Active Directory with Azure Arc-enabled Kubernetes clusters
10+
# Use Azure RBAC for Azure Arc-enabled Kubernetes clusters
1111

1212
Kubernetes [ClusterRoleBinding and RoleBinding](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#rolebinding-and-clusterrolebinding) object types help to define authorization in Kubernetes natively. By using this feature, you can use Azure Active Directory (Azure AD) and role assignments in Azure to control authorization checks on the cluster. This implies that you can now use Azure role assignments to granularly control who can read, write, and delete Kubernetes objects like deployment, pod, and service.
1313

@@ -17,9 +17,9 @@ A conceptual overview of this feature is available in the [Azure RBAC on Azure A
1717

1818
## Prerequisites
1919

20-
- [Install or upgrade the Azure CLI](/cli/azure/install-azure-cli) to version 2.16.0 or later.
20+
- [Install or upgrade the Azure CLI](/cli/azure/install-azure-cli) to the latest version.
2121

22-
- Install the `connectedk8s` Azure CLI extension, version 1.1.0 or later:
22+
- Install the latest version of `connectedk8s` Azure CLI extension:
2323

2424
```azurecli
2525
az extension add --name connectedk8s
@@ -33,7 +33,7 @@ A conceptual overview of this feature is available in the [Azure RBAC on Azure A
3333
3434
- Connect an existing Azure Arc-enabled Kubernetes cluster:
3535
- If you haven't connected a cluster yet, use our [quickstart](quickstart-connect-cluster.md).
36-
- [Upgrade your agents](agent-upgrade.md#manually-upgrade-agents) to version 1.1.0 or later.
36+
- [Upgrade your agents](agent-upgrade.md#manually-upgrade-agents) to the latest version.
3737
3838
> [!NOTE]
3939
> You can't set up this feature for managed Kubernetes offerings of cloud providers like Elastic Kubernetes Service or Google Kubernetes Engine where the user doesn't have access to the API server of the cluster. For Azure Kubernetes Service (AKS) clusters, this [feature is available natively](../../aks/manage-azure-rbac.md) and doesn't require the AKS cluster to be connected to Azure Arc. This feature isn't supported on AKS on Azure Stack HCI.

articles/azure-arc/kubernetes/quickstart-connect-cluster.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,9 @@ For a conceptual look at connecting clusters to Azure Arc, see [Azure Arc-enable
2828
> * The identity must have 'Read' and 'Write' permissions on the Azure Arc-enabled Kubernetes resource type (`Microsoft.Kubernetes/connectedClusters`).
2929
> * The [Kubernetes Cluster - Azure Arc Onboarding built-in role](../../role-based-access-control/built-in-roles.md#kubernetes-cluster---azure-arc-onboarding) can be used for this identity. This role is useful for at-scale onboarding, as it has only the granular permissions required to connect clusters to Azure Arc, and doesn't have permission to update, delete, or modify any other clusters or other Azure resources.
3030
31-
* [Install or upgrade Azure CLI](/cli/azure/install-azure-cli) to version >= 2.16.0
31+
* [Install or upgrade Azure CLI](/cli/azure/install-azure-cli) to the latest version.
3232

33-
* Install the **connectedk8s** Azure CLI extension of version >= 1.2.0:
33+
* Install the latest version of **connectedk8s** Azure CLI extension:
3434

3535
```azurecli
3636
az extension add --name connectedk8s
@@ -307,6 +307,10 @@ If your cluster is behind an outbound proxy server, requests must be routed via
307307

308308
For outbound proxy servers where only a trusted certificate needs to be provided without the proxy server endpoint inputs, `az connectedk8s connect` can be run with just the `--proxy-cert` input specified. In case multiple trusted certificates are expected, the combined certificate chain can be provided in a single file using the `--proxy-cert` parameter.
309309

310+
> [!NOTE]
311+
>
312+
> * `--custom-ca-cert` is an alias for `--proxy-cert`. Either parameters can be used interchangeably. Passing both parameters in the same command will honour the one passed last.
313+
310314
### [Azure CLI](#tab/azure-cli)
311315

312316
Run the connect command with the `--proxy-cert` parameter specified:

0 commit comments

Comments
 (0)