|
2 | 2 | title: "Azure Arc-enabled Kubernetes connectivity modes"
|
3 | 3 | services: azure-arc
|
4 | 4 | ms.service: azure-arc
|
5 |
| -ms.date: 11/23/2021 |
| 5 | +ms.date: 08/22/2022 |
6 | 6 | ms.topic: conceptual
|
7 | 7 | description: "This article provides an overview of the connectivity modes supported by Azure Arc-enabled Kubernetes"
|
8 | 8 | keywords: "Kubernetes, Arc, Azure, containers"
|
9 | 9 | ---
|
10 | 10 |
|
11 | 11 | # Azure Arc-enabled Kubernetes connectivity modes
|
12 | 12 |
|
13 |
| -Azure Arc-enabled Kubernetes requires deployment of Azure Arc agents on your Kubernetes clusters using which capabilities like configurations (GitOps), extensions, Cluster Connect and Custom Location are made available on the cluster. Kubernetes clusters deployed on the edge may not have constant network connectivity and as a result the agents may not be able to always reach the Azure Arc services. This semi-connected mode however is a supported scenario. To support semi-connected modes of deployment, for features like configurations and extensions, agents rely on pulling of desired state specification from the Arc services and later realizing this state on the cluster. |
| 13 | +Azure Arc-enabled Kubernetes requires deployment of Azure Arc agents on your Kubernetes clusters so that capabilities such as configurations (GitOps), extensions, Cluster Connect and Custom Location are made available on the cluster. Kubernetes clusters deployed on the edge may not have constant network connectivity, and as a result, in a semi-connected mode the agents may not always be able to reach the Azure Arc services. This topic explains how Azure Arc features can be used with semi-connected modes of deployment. |
14 | 14 |
|
15 | 15 | ## Understand connectivity modes
|
16 | 16 |
|
17 |
| -| Connectivity mode | Description | |
18 |
| -| ----------------- | ----------- | |
19 |
| -| Fully connected | Agents can consistently communicate with Azure with little delay in propagating GitOps configurations, enforcing Azure Policy and Gatekeeper policies, and collecting workload metrics and logs in Azure Monitor. | |
20 |
| -| Semi-connected | The managed identity certificate pulled down by the `clusteridentityoperator` is valid for up to 90 days before the certificate expires. Upon expiration, the Azure Arc-enabled Kubernetes resource stops working. To reactivate all Azure Arc features on the cluster, delete, and recreate the Azure Arc-enabled Kubernetes resource and agents. During the 90 days, connect the cluster at least once every 30 days. | |
21 |
| -| Disconnected | Kubernetes clusters in disconnected environments unable to access Azure are currently unsupported by Azure Arc-enabled Kubernetes. If this capability is of interest to you, submit or up-vote an idea on [Azure Arc's UserVoice forum](https://feedback.azure.com/d365community/forum/5c778dec-0625-ec11-b6e6-000d3a4f0858). |
| 17 | +When working with Azure Arc-enabled Kubernetes clusters, it's important to understand how network connectivity modes impact your operations. |
22 | 18 |
|
| 19 | +- **Fully connected**: With ongoing network connectivity, agents can consistently communicate with Azure. In this mode, there is typically little delay with tasks such as propagating GitOps configurations, enforcing Azure Policy and Gatekeeper policies, or collecting workload metrics and logs in Azure Monitor. |
| 20 | +- **Semi-connected**: Azure Arc agents can pull desired state specification from the Arc services, then later realize this state on the cluster. |
| 21 | + > [!IMPORTANT] |
| 22 | + > The managed identity certificate pulled down by the `clusteridentityoperator` is valid for up to 90 days before it expires. The agents will try to renew the certificate during this time period; however, if there is no network connectivity, the certificate may expire, and the Azure Arc-enabled Kubernetes resource will stop working. Because of this, we recommend ensuring that the connected cluster has network connectivity at least once every 30 days. If the certificate expires, you'll need to delete and then recreate the Azure Arc-enabled Kubernetes resource and agents in order to reactivate Azure Arc features on the cluster. |
| 23 | +- **Disconnected**: Kubernetes clusters in disconnected environments that are unable to access Azure are not currently supported by Azure Arc-enabled Kubernetes. |
23 | 24 |
|
24 | 25 | ## Connectivity status
|
25 | 26 |
|
26 | 27 | The connectivity status of a cluster is determined by the time of the latest heartbeat received from the Arc agents deployed on the cluster:
|
27 | 28 |
|
28 | 29 | | Status | Description |
|
29 | 30 | | ------ | ----------- |
|
30 |
| -| Connecting | Azure Arc-enabled Kubernetes resource is created in Azure Resource Manager, but service hasn't received the agent heartbeat yet. | |
31 |
| -| Connected | Azure Arc-enabled Kubernetes service received an agent heartbeat sometime within the previous 15 minutes. | |
32 |
| -| Offline | Azure Arc-enabled Kubernetes resource was previously connected, but the service hasn't received any agent heartbeat for 15 minutes. | |
33 |
| -| Expired | Managed identity certificate of the cluster has an expiration window of 90 days after it is issued. Once this certificate expires, the resource is considered `Expired` and all features such as configuration, monitoring, and policy stop working on this cluster. More information on how to address expired Azure Arc-enabled Kubernetes resources can be found [in the FAQ article](./faq.md#how-do-i-address-expired-azure-arc-enabled-kubernetes-resources). | |
| 31 | +| Connecting | The Azure Arc-enabled Kubernetes resource has been created in Azure, but the service hasn't received the agent heartbeat yet. | |
| 32 | +| Connected | The Azure Arc-enabled Kubernetes service received an agent heartbeat within the previous 15 minutes. | |
| 33 | +| Offline | The Azure Arc-enabled Kubernetes resource was previously connected, but the service hasn't received any agent heartbeat for 15 minutes. | |
| 34 | +| Expired | The managed identity certificate of the cluster has expired. In this state, Azure Arc features will no longer work on the cluster. For more information on how to address expired Azure Arc-enabled Kubernetes resources, see the [FAQ](./faq.md#how-do-i-address-expired-azure-arc-enabled-kubernetes-resources). | |
34 | 35 |
|
35 | 36 | ## Next steps
|
36 | 37 |
|
37 |
| -* Walk through our quickstart to [connect a Kubernetes cluster to Azure Arc](./quickstart-connect-cluster.md). |
38 |
| -* Learn more about the creating connections between your cluster and a Git repository as a [configuration resource with Azure Arc-enabled Kubernetes](./conceptual-configurations.md). |
| 38 | +- Walk through our quickstart to [connect a Kubernetes cluster to Azure Arc](./quickstart-connect-cluster.md). |
| 39 | +- Learn more about creating connections between your cluster and a Git repository as a [configuration resource with Azure Arc-enabled Kubernetes](./conceptual-configurations.md). |
0 commit comments