You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-arc/kubernetes/azure-rbac.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ For a conceptual overview of this feature, see [Azure RBAC on Azure Arc-enabled
35
35
- [Upgrade your agents](agent-upgrade.md#manually-upgrade-agents) to the latest version.
36
36
37
37
> [!NOTE]
38
-
> You can't set up this feature for Red Hat OpenShift, or for managed Kubernetes offerings of cloud providers like Elastic Kubernetes Service or Google Kubernetes Engine where the user doesn't have access to the API server of the cluster. For Azure Kubernetes Service (AKS) clusters, this [feature is available natively](../../aks/manage-azure-rbac.md) and doesn't require the AKS cluster to be connected to Azure Arc. For AKS on Azure Stack HCI, see [Use Azure RBAC for AKS hybrid clusters (preview)](/azure/aks/hybrid/azure-rbac-aks-hybrid).
38
+
> You can't set up this feature for Red Hat OpenShift, or for managed Kubernetes offerings of cloud providers like Elastic Kubernetes Service or Google Kubernetes Engine where the user doesn't have access to the API server of the cluster. For Azure Kubernetes Service (AKS) clusters, this [feature is available natively](../../aks/manage-azure-rbac.md) and doesn't require the AKS cluster to be connected to Azure Arc.
Copy file name to clipboardExpand all lines: articles/azure-arc/kubernetes/extensions-release.md
+4-7Lines changed: 4 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: "Available extensions for Azure Arc-enabled Kubernetes clusters"
3
-
ms.date: 11/03/2023
3
+
ms.date: 02/08/2024
4
4
ms.topic: how-to
5
5
description: "See which extensions are currently available for Azure Arc-enabled Kubernetes clusters and view release notes."
6
6
---
@@ -11,9 +11,6 @@ description: "See which extensions are currently available for Azure Arc-enabled
11
11
12
12
The following extensions are currently available for use with Arc-enabled Kubernetes clusters. All of these extensions are [cluster-scoped](conceptual-extensions.md#extension-scope), except for Azure API Management on Azure Arc, which is namespace-scoped.
13
13
14
-
> [!NOTE]
15
-
> Installing Azure Arc extensions on [Azure Kubernetes Service (AKS) hybrid clusters provisioned from Azure](extensions.md#aks-hybrid-clusters-provisioned-from-azure-preview) is currently in preview, with support for the Azure Arc-enabled Open Service Mesh, Azure Key Vault Secrets Provider, Flux (GitOps) and Microsoft Defender for Cloud extensions.
16
-
17
14
## Azure Monitor Container Insights
18
15
19
16
-**Supported distributions**: All Cloud Native Computing Foundation (CNCF) certified Kubernetes clusters
@@ -30,15 +27,15 @@ For more information, see [Understand Azure Policy for Kubernetes clusters](../.
30
27
31
28
## Azure Key Vault Secrets Provider
32
29
33
-
-**Supported distributions**: AKS on Azure Stack HCI, AKS hybrid clusters provisioned from Azure, Cluster API Azure, Google Kubernetes Engine, Canonical Kubernetes Distribution, OpenShift Kubernetes Distribution, Amazon Elastic Kubernetes Service, VMware Tanzu Kubernetes Grid
30
+
-**Supported distributions**: AKS on Azure Stack HCI, AKS enabled by Azure Arc, Cluster API Azure, Google Kubernetes Engine, Canonical Kubernetes Distribution, OpenShift Kubernetes Distribution, Amazon Elastic Kubernetes Service, VMware Tanzu Kubernetes Grid
34
31
35
32
The Azure Key Vault Provider for Secrets Store CSI Driver allows for the integration of Azure Key Vault as a secrets store with a Kubernetes cluster via a CSI volume. For Azure Arc-enabled Kubernetes clusters, you can install the Azure Key Vault Secrets Provider extension to fetch secrets.
36
33
37
34
For more information, see [Use the Azure Key Vault Secrets Provider extension to fetch secrets into Azure Arc-enabled Kubernetes clusters](tutorial-akv-secrets-provider.md).
38
35
39
36
## Microsoft Defender for Containers
40
37
41
-
-**Supported distributions**: AKS hybrid clusters provisioned from Azure, Cluster API Azure, Azure Red Hat OpenShift, Red Hat OpenShift (version 4.6 or newer), Google Kubernetes Engine Standard, Amazon Elastic Kubernetes Service, VMware Tanzu Kubernetes Grid, Rancher Kubernetes Engine, Canonical Kubernetes Distribution
38
+
-**Supported distributions**: AKS enabled by Azure Arc, Cluster API Azure, Azure Red Hat OpenShift, Red Hat OpenShift (version 4.6 or newer), Google Kubernetes Engine Standard, Amazon Elastic Kubernetes Service, VMware Tanzu Kubernetes Grid, Rancher Kubernetes Engine, Canonical Kubernetes Distribution
42
39
43
40
Microsoft Defender for Containers is the cloud-native solution that is used to secure your containers so you can improve, monitor, and maintain the security of your clusters, containers, and their applications. It gathers information related to security like audit log data from the Kubernetes cluster, and provides recommendations and threat alerts based on gathered data.
44
41
@@ -50,7 +47,7 @@ For more information, see [Enable Microsoft Defender for Containers](../../defen
50
47
51
48
## Azure Arc-enabled Open Service Mesh
52
49
53
-
-**Supported distributions**: AKS, AKS on Azure Stack HCI, AKS hybrid clusters provisioned from Azure, Cluster API Azure, Google Kubernetes Engine, Canonical Kubernetes Distribution, Rancher Kubernetes Engine, OpenShift Kubernetes Distribution, Amazon Elastic Kubernetes Service, VMware Tanzu Kubernetes Grid
50
+
-**Supported distributions**: AKS, AKS on Azure Stack HCI, AKS enabled by Azure Arc, Cluster API Azure, Google Kubernetes Engine, Canonical Kubernetes Distribution, Rancher Kubernetes Engine, OpenShift Kubernetes Distribution, Amazon Elastic Kubernetes Service, VMware Tanzu Kubernetes Grid
54
51
55
52
[Open Service Mesh (OSM)](https://docs.openservicemesh.io/) is a lightweight, extensible, Cloud Native service mesh that allows users to uniformly manage, secure, and get out-of-the-box observability features for highly dynamic microservice environments.
Copy file name to clipboardExpand all lines: articles/azure-arc/kubernetes/extensions.md
+2-35Lines changed: 2 additions & 35 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: "Deploy and manage Azure Arc-enabled Kubernetes cluster extensions"
3
3
ms.custom: devx-track-azurecli
4
-
ms.date: 04/27/2023
4
+
ms.date: 02/08/2024
5
5
ms.topic: how-to
6
6
description: "Create and manage extension instances on Azure Arc-enabled Kubernetes clusters."
7
7
---
@@ -33,9 +33,6 @@ Before you begin, read the [conceptual overview of Arc-enabled Kubernetes cluste
33
33
* If you haven't connected a cluster yet, use our [quickstart](quickstart-connect-cluster.md).
34
34
* [Upgrade your agents](agent-upgrade.md#manually-upgrade-agents) to the latest version.
35
35
36
-
> [!NOTE]
37
-
> Installing Azure Arc extensions on [AKS hybrid clusters provisioned from Azure](extensions.md#aks-hybrid-clusters-provisioned-from-azure-preview) is currently in preview, with support for the Azure Arc-enabled Open Service Mesh, Azure Key Vault Secrets Provider, Flux (GitOps) and Microsoft Defender for Cloud extensions.
38
-
39
36
## Create extension instance
40
37
41
38
To create a new extension instance, use `k8s-extension create`, passing in values for the required parameters.
> The service is unable to retain sensitive information for more than 48 hours. If Azure Arc-enabled Kubernetes agents don't have network connectivity for more than 48 hours and can't determine whether to create an extension on the cluster, the extension transitions to `Failed` state. Once that happens, you'll need to run `k8s-extension create` again to create a fresh extension Azure resource.
87
84
>
88
-
> Azure Monitor Container Insights is a singleton extension (only one required per cluster). You'll need to clean up any previous Helm chart installations of Azure Monitor Container Insights (without extensions) before installing the same via extensions. Follow the instructions for [deleting the Helm chart](../../azure-monitor/containers/container-insights-optout-hybrid.md) before running `az k8s-extension create`.
85
+
> Azure Monitor Container Insights is a singleton extension (only one required per cluster). You'll need to clean up any previous Helm chart installations of Azure Monitor Container Insights (without extensions) before installing the same via extensions. Follow the instructions for [deleting the Helm chart](/azure/azure-monitor/containers/kubernetes-monitoring-disable#remove-container-insights-with-helm) before running `az k8s-extension create`.
89
86
90
87
### Required parameters
91
88
@@ -100,9 +97,6 @@ The following parameters are required when using `az k8s-extension create` to cr
100
97
|`--resource-group`| The resource group containing the Azure Arc-enabled Kubernetes resource |
101
98
|`--cluster-type`| The cluster type on which the extension instance has to be created. For most scenarios, use `connectedClusters`, which corresponds to Azure Arc-enabled Kubernetes clusters. |
102
99
103
-
> [!NOTE]
104
-
> When working with [AKS hybrid clusters provisioned from Azure](#aks-hybrid-clusters-provisioned-from-azure-preview), you must set `--cluster-type` to use `provisionedClusters` and also add `--cluster-resource-provider microsoft.hybridcontainerservice` to the command. Installing Azure Arc extensions on AKS hybrid clusters provisioned from Azure is currently in preview.
105
-
106
100
### Optional parameters
107
101
108
102
Use one or more of these optional parameters as needed for your scenarios, along with the required parameters.
> The Azure resource representing this extension gets deleted immediately. The Helm release on the cluster associated with this extension is only deleted when the agents running on the Kubernetes cluster have network connectivity and can reach out to Azure services again to fetch the desired state.
295
289
296
-
> [!IMPORTANT]
297
-
> When working with [AKS hybrid clusters provisioned from Azure](#aks-hybrid-clusters-provisioned-from-azure-preview), you must add `--yes` to the delete command. Installing Azure Arc extensions on AKS hybrid clusters provisioned from Azure is currently in preview.
298
-
299
-
## AKS hybrid clusters provisioned from Azure (preview)
300
-
301
-
You can deploy extensions to AKS hybrid clusters provisioned from Azure. However, there are a few key differences to keep in mind in order to deploy successfully:
302
-
303
-
* The value for the `--cluster-type` parameter must be `provisionedClusters`.
304
-
* You must add `--cluster-resource-provider microsoft.hybridcontainerservice` to your commands.
305
-
* When deleting an extension instance, you must add `--yes` to the command:
In addition, you must be using the latest version of the Azure CLI `k8s-extension` module (version >= 1.3.3). Use the following commands to add or update to the latest version:
312
-
313
-
```azurecli
314
-
# add if you do not have this installed
315
-
az extension add --name k8s-extension
316
-
317
-
# update if you do have the module installed
318
-
az extension update --name k8s-extension
319
-
```
320
-
321
-
> [!IMPORTANT]
322
-
> Installing Azure Arc extensions on AKS hybrid clusters provisioned from Azure is currently in preview.
Copy file name to clipboardExpand all lines: articles/azure-arc/kubernetes/gitops-flux2-parameters.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: "GitOps (Flux v2) supported parameters"
3
3
description: "Understand the supported parameters for GitOps (Flux v2) in Azure for use in Azure Arc-enabled Kubernetes and Azure Kubernetes Service (AKS) clusters."
4
-
ms.date: 12/11/2023
4
+
ms.date: 02/08/2024
5
5
ms.topic: conceptual
6
6
---
7
7
@@ -23,11 +23,11 @@ This article describes some of the parameters and arguments available for the `a
23
23
| Parameter | Format | Notes |
24
24
| ------------- | ------------- | ------------- |
25
25
|`--cluster-name``-c`| String | Name of the cluster resource in Azure. |
26
-
|`--cluster-type``-t`| Allowed values: `connectedClusters`, `managedClusters`, `provisionedClusters`| Use `connectedClusters` for Azure Arc-enabled Kubernetes clusters, `managedClusters` for AKS clusters, or `provisionedClusters` for [AKS hybrid clusters provisioned from Azure](extensions.md#aks-hybrid-clusters-provisioned-from-azure-preview) (installing extensions on these clusters is currently in preview). |
26
+
|`--cluster-type``-t`| Allowed values: `connectedClusters`, `managedClusters`| Use `connectedClusters` for Azure Arc-enabled Kubernetes clustersor `managedClusters` for AKS clusters. |
27
27
|`--resource-group``-g`| String | Name of the Azure resource group that holds the cluster resource. |
28
28
|`--name``-n`| String | Name of the Flux configuration in Azure. |
29
29
|`--namespace``--ns`| String | Name of the namespace to deploy the configuration. Default: `default`. |
30
-
| `--scope``-s` | String | Permission scope for the operators. Possible values are `cluster` (full access) or `namespace` (restricted access). Default: `cluster`.
30
+
|`--scope``-s`| String | Permission scope for the operators. Possible values are `cluster` (full access) or `namespace` (restricted access). Default: `cluster`.|
31
31
|`--suspend`| flag | Suspends all source and kustomize reconciliations defined in this Flux configuration. Reconciliations active at the time of suspension will continue. |
Copy file name to clipboardExpand all lines: articles/azure-arc/kubernetes/tutorial-akv-secrets-provider.md
+8-12Lines changed: 8 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Use Azure Key Vault Secrets Provider extension to fetch secrets into Azure Arc-enabled Kubernetes clusters
3
3
description: Learn how to set up the Azure Key Vault Provider for Secrets Store CSI Driver interface as an extension on Azure Arc enabled Kubernetes cluster
4
4
ms.custom: devx-track-azurecli
5
-
ms.date: 07/27/2023
5
+
ms.date: 02/09/2024
6
6
ms.topic: how-to
7
7
---
8
8
@@ -24,7 +24,7 @@ Capabilities of the Azure Key Vault Secrets Provider extension include:
24
24
- A cluster with a supported Kubernetes distribution that has already been [connected to Azure Arc](quickstart-connect-cluster.md). The following Kubernetes distributions are currently supported for this scenario:
25
25
- Cluster API Azure
26
26
- Azure Kubernetes Service (AKS) clusters on Azure Stack HCI
27
-
- AKS hybrid clusters provisioned from Azure
27
+
- AKS enabled by Azure Arc
28
28
- Google Kubernetes Engine
29
29
- OpenShift Kubernetes Distribution
30
30
- Canonical Kubernetes Distribution
@@ -33,18 +33,14 @@ Capabilities of the Azure Key Vault Secrets Provider extension include:
33
33
- Azure Red Hat OpenShift
34
34
- Ensure you've met the [general prerequisites for cluster extensions](extensions.md#prerequisites). You must use version 0.4.0 or newer of the `k8s-extension` Azure CLI extension.
35
35
36
-
> [!TIP]
37
-
> When using this extension with [AKS hybrid clusters provisioned from Azure](extensions.md#aks-hybrid-clusters-provisioned-from-azure-preview) you must set `--cluster-type` to use `provisionedClusters` and also add `--cluster-resource-provider microsoft.hybridcontainerservice` to the command. Installing Azure Arc extensions on AKS hybrid clusters provisioned from Azure is currently in preview.
38
-
39
36
## Install the Azure Key Vault Secrets Provider extension on an Arc-enabled Kubernetes cluster
40
37
41
38
You can install the Azure Key Vault Secrets Provider extension on your connected cluster in the Azure portal, by using Azure CLI, or by deploying an ARM template.
42
39
43
-
> [!TIP]
44
-
> If the cluster is behind an outbound proxy server, ensure that you connect it to Azure Arc using the [proxy configuration](quickstart-connect-cluster.md#connect-using-an-outbound-proxy-server) option before installing the extension.
40
+
Only one instance of the extension can be deployed on each Azure Arc-enabled Kubernetes cluster.
45
41
46
42
> [!TIP]
47
-
> Only one instance of the extension can be deployed on each Azure Arc-enabled Kubernetes cluster.
43
+
> If the cluster is behind an outbound proxy server, ensure that you connect it to Azure Arc using the [proxy configuration](quickstart-connect-cluster.md#connect-using-an-outbound-proxy-server) option before installing the extension.
48
44
49
45
### Azure portal
50
46
@@ -284,7 +280,7 @@ Before you move on to the next section, take note of the following properties:
284
280
Currently, the Secrets Store CSI Driver on Arc-enabled clusters can be accessed through a service principal. Follow these steps to provide an identity that can access your Key Vault.
285
281
286
282
1. Follow the steps [to create a service principal in Azure](../../active-directory/develop/howto-create-service-principal-portal.md#register-an-application-with-azure-ad-and-create-a-service-principal). Take note of the Client ID and Client Secret generated in this step.
287
-
1.Provide Azure Key Vault GET permission to the created service principal by [following these steps](../../key-vault/general/assign-access-policy.md).
283
+
1.Next, [ensure Azure Key Vault has GET permission to the created service principal](../../key-vault/general/assign-access-policy.md#assign-an-access-policy).
288
284
1. Use the client ID and Client Secret from the first step to create a Kubernetes secret on the connected cluster:
289
285
290
286
```bash
@@ -297,7 +293,7 @@ Currently, the Secrets Store CSI Driver on Arc-enabled clusters can be accessed
1. Create a SecretProviderClass with the following YAML, filling in your values for key vault name, tenant ID, and objects to retrieve from your AKV instance:
296
+
1. Create a `SecretProviderClass` with the following YAML, filling in your values for key vault name, tenant ID, and objects to retrieve from your AKV instance:
301
297
302
298
```yml
303
299
# This is a SecretProviderClass example using service principal to access Keyvault
@@ -320,7 +316,7 @@ Currently, the Secrets Store CSI Driver on Arc-enabled clusters can be accessed
320
316
tenantId: <tenant-Id> # The tenant ID of the Azure Key Vault instance
321
317
```
322
318
323
-
For use with national clouds, change `cloudName` to `AzureUSGovernmentCloud` for U.S. Government Cloud, or to `AzureChinaCloud` for Azure China Cloud.
319
+
For use with national clouds, change `cloudName` to `AzureUSGovernmentCloud` for Azure Government, or to `AzureChinaCloud` for Microsoft Azure operated by 21Vianet.
324
320
325
321
1. Apply the SecretProviderClass to your cluster:
326
322
@@ -400,7 +396,7 @@ You can also change these settings after installation by using the `az k8s-exten
You can use other configuration settings as needed for your deployment. For example, to change the kubelet root directory while creating a cluster, modify the az k8s-extension create command:
399
+
You can use other configuration settings as needed for your deployment. For example, to change the kubelet root directory while creating a cluster, modify the `az k8s-extension create` command:
Copy file name to clipboardExpand all lines: articles/azure-arc/kubernetes/tutorial-arc-enabled-open-service-mesh.md
+1-4Lines changed: 1 addition & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ Azure Arc-enabled Open Service Mesh can be deployed through Azure portal, Azure
30
30
- The following Kubernetes distributions are currently supported:
31
31
- AKS (Azure Kubernetes Service) Engine
32
32
- AKS clusters on Azure Stack HCI
33
-
- AKS hybrid clusters provisioned from Azure
33
+
- AKS enabled by Azure Arc
34
34
- Cluster API Azure
35
35
- Google Kubernetes Engine
36
36
- Canonical Kubernetes Distribution
@@ -40,9 +40,6 @@ Azure Arc-enabled Open Service Mesh can be deployed through Azure portal, Azure
40
40
- VMware Tanzu Kubernetes Grid
41
41
- Azure Monitor integration with Azure Arc-enabled Open Service Mesh is available [in preview with limited support](#monitoring-application-using-azure-monitor-and-applications-insights-preview).
42
42
43
-
> [!TIP]
44
-
> When using this extension with [AKS hybrid clusters provisioned from Azure](extensions.md#aks-hybrid-clusters-provisioned-from-azure-preview) you must set `--cluster-type` to use `provisionedClusters` and also add `--cluster-resource-provider microsoft.hybridcontainerservice` to the command. Installing Azure Arc extensions on AKS hybrid clusters provisioned from Azure is currently in preview.
45
-
46
43
## Basic installation using Azure portal
47
44
48
45
To deploy using Azure portal, once you have an Arc connected cluster, go to the cluster's **Open Service Mesh** section.
0 commit comments