You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/best-practices-app-cluster-reliability.md
+29-25Lines changed: 29 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -186,33 +186,37 @@ You can use the `nodeSelector` field in your pod specification to specify the no
186
186
The following example pod definition file shows how to use pod anti-affinity to ensure that pods are spread across nodes:
187
187
188
188
```yaml
189
-
apiVersion: v1
190
-
kind: Pod
189
+
apiVersion: apps/v1
190
+
kind: Deployment
191
191
metadata:
192
-
name: with-node-affinity
192
+
name: multi-zone-deployment
193
+
labels:
194
+
app: myapp
193
195
spec:
194
-
affinity:
195
-
nodeAffinity:
196
-
requiredDuringSchedulingIgnoredDuringExecution:
197
-
nodeSelectorTerms:
198
-
- matchExpressions:
199
-
- key: topology.kubernetes.io/zone
200
-
operator: In
201
-
values:
202
-
- 0 # Azure Availability Zone 0
203
-
- 1 # Azure Availability Zone 1
204
-
- 2 # Azure Availability Zone 2
205
-
preferredDuringSchedulingIgnoredDuringExecution:
206
-
- weight: 1
207
-
preference:
208
-
matchExpressions:
209
-
- key: another-node-label-key
210
-
operator: In
211
-
values:
212
-
- another-node-label-value
213
-
containers:
214
-
- name: with-node-affinity
215
-
image: registry.k8s.io/pause:2.0
196
+
replicas: 3
197
+
selector:
198
+
matchLabels:
199
+
app: myapp
200
+
template:
201
+
metadata:
202
+
labels:
203
+
app: myapp
204
+
spec:
205
+
containers:
206
+
- name: myapp-container
207
+
image: nginx
208
+
ports:
209
+
- containerPort: 80
210
+
affinity:
211
+
podAntiAffinity:
212
+
requiredDuringSchedulingIgnoredDuringExecution:
213
+
- labelSelector:
214
+
matchExpressions:
215
+
- key: app
216
+
operator: In
217
+
values:
218
+
- myapp
219
+
topologyKey: topology.kubernetes.io/zone
216
220
```
217
221
218
222
For more information, see [Affinity and anti-affinity in Kubernetes](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity).
#Customer intent: As a developer or cluster operator, I want to deploy an AKS cluster and deploy an application so I can see how to run applications using the managed Kubernetes service in Azure.
10
10
---
@@ -67,7 +67,7 @@ The quickstart application includes the following Kubernetes deployments and ser
67
67
68
68
The `azd` template contains all the code needed to create the services, but you need to sign in to your Azure account in order to host the application on AKS.
69
69
70
-
1. Sign in to your account using the [`azd auth login`][az-auth-login] command.
70
+
1. Sign in to your account using the [`azd auth login`][azd-auth-login] command.
71
71
72
72
```azdeveloper
73
73
azd auth login
@@ -97,7 +97,7 @@ The `azd` template contains all the code needed to create the services, but you
97
97
98
98
## Create and deploy resources for your cluster
99
99
100
-
`azd` runs all the hooks inside of the [`azd-hooks` folder](https://github.com/Azure-Samples/aks-store-demo/tree/main/azd-hooks) to preregister, provision, and deploy the application services.
100
+
`azd` runs all the hooks inside of the [`azd-hooks` folder][azd-hooks-folder] to preregister, provision, and deploy the application services.
101
101
102
102
The `azd` template for this quickstart creates a new resource group with an AKS cluster and an Azure key vault. The key vault stores client secrets and runs the services in the `pets` namespace
103
103
@@ -135,15 +135,19 @@ The `azd` template for this quickstart creates a new resource group with an AKS
135
135
136
136
## Test the application
137
137
138
-
When the application runs, a Kubernetes service exposes the application front end to the internet. This process can take a few minutes to complete.
138
+
When the application runs, a Kubernetes service exposes the application front end to the internet. This process can take a few minutes to complete. To manage a Kubernetes cluster, use the Kubernetes command-line client, [kubectl][kubectl]. `kubectl` is already installed during `azd up`.
139
139
140
140
1. Set your namespace as the demo namespace `pets` using the [`kubectl set-context`][kubectl-set-context] command.
2. Check the status of the deployed pods using the [`kubectl get pods`][kubectl-get-pods] command. Make sure all pods are `Running` before proceeding.
146
+
2. Check the status of the deployed pods using the [`kubectl get pods`][kubectl-get] command. Make sure all pods are `Running` before proceeding.
147
+
148
+
```console
149
+
kubectl get pods
150
+
```
147
151
148
152
3. Check for a public IP address for the store-front application and monitor progress using the [`kubectl get service`][kubectl-get] command with the `--watch` argument.
149
153
@@ -175,7 +179,7 @@ When the application runs, a Kubernetes service exposes the application front en
175
179
176
180
Once you're finished with the quickstart, clean up unnecessary resources to avoid Azure charges.
177
181
178
-
1. Delete all the resources created in the quickstart using the [`azd down`][az-down] command.
182
+
1. Delete all the resources created in the quickstart using the [`azd down`][azd-down] command.
179
183
180
184
```azdeveloper
181
185
azd down
@@ -215,26 +219,18 @@ To learn more about AKS and walk through a complete code-to-deployment example,
Copy file name to clipboardExpand all lines: articles/azure-vmware/deploy-disaster-recovery-using-vmware-hcx.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,9 +16,9 @@ The diagram shows the deployment of VMware HCX from on-premises VMware vSphere t
16
16
:::image type="content" source="./media/disaster-recovery-virtual-machines/hcx-disaster-recovery-scenario-1-diagram.png" alt-text="Diagram shows the VMware HCX manual disaster recovery solution in Azure VMware Solution with on-premises VMware vSphere." border="true" lightbox="./media/disaster-recovery-virtual-machines/hcx-disaster-recovery-scenario-1-diagram.png":::
17
17
18
18
>[!IMPORTANT]
19
-
>Although part of VMware HCX, VMware HCX Disaster Recovery (DR) is not recommended for large deployments. The disaster recovery orchestration is 100% manual, and Azure VMware Solution currently doesn't have runbooks or features to support manual VMware HCX DR failover. For enterprise-class disaster recovery, refer to VMware Site Recovery Manager (SRM) or VMware business continuity and disaster recovery (BCDR) solutions.
19
+
>Although part of VMware HCX, VMware HCX Disaster Recovery (DR) is not recommended for large deployments. The disaster recovery orchestration is 100% manual, and Azure VMware Solution currently doesn't have runbooks or features to support manual VMware HCX DR failover. For enterprise-class disaster recovery, refer to VMware Site Recovery Manager (SRM) or VMware Business Continuity and Disaster Recovery (BCDR) solutions.
20
20
21
-
VMware HCX provides various operations that provide fine control and granularity in replication policies. Available Operations include:
21
+
VMware HCX provides various operations for fine control and granularity in replication policies. Available Operations include:
22
22
23
23
-**Reverse** – After a disaster occurs, reverse helps make Site B the source site and Site A, where the protected VM now lives.
Copy file name to clipboardExpand all lines: articles/azure-vmware/enable-public-ip-nsx-edge.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -90,7 +90,7 @@ A Source Network Address Translation (SNAT) service with Port Address Translatio
90
90
91
91
#### Create a SNAT rule
92
92
93
-
1. In your Azure VMware Solution private cloud, select **vCenter Server Credentials**.
93
+
1. In your Azure VMware Solution private cloud, select **VMware credentials**.
94
94
1. Locate your NSX Manager URL and credentials.
95
95
1. Sign in to VMware NSX Manager.
96
96
1. Go to **NAT Rules**.
@@ -116,7 +116,8 @@ For more information on NSX-T Data Center NAT configuration and options, see the
116
116
117
117
You can create a No-NAT or No-SNAT rule in NSX Manager to exclude certain matches from performing NAT. This policy can be used to allow private IP address traffic to bypass existing network translation rules.
118
118
119
-
1. In your Azure VMware Solution private cloud, select **vCenter Server Credentials**.
119
+
1. In your Azure VMware Solution private cloud, select **VMware credentials**.
120
+
1. Locate your NSX Manager URL and credentials.
120
121
1. Sign in to NSX Manager, and then select **NAT Rules**.
121
122
1. Select the T1 router, and then select **Add NAT Rule**.
122
123
1. Select **No SNAT** rule as the type of NAT rule.
@@ -129,7 +130,8 @@ A Destination Network Translation (DNAT) service is used to expose a VM on a spe
129
130
130
131
#### Create a DNAT rule
131
132
132
-
1. In your Azure VMware Solution private cloud, select **vCenter Server Credentials**.
133
+
1. In your Azure VMware Solution private cloud, select **VMware credentials**.
134
+
1. Locate your NSX Manager URL and credentials.
133
135
1. Sign in to NSX Manager, and then select **NAT Rules**.
134
136
1. Select the T1 router, and then select **Add DNAT Rule**.
135
137
1. Enter a name for the rule.
@@ -147,6 +149,7 @@ The VM is now exposed to the internet on the specific public IP address or on sp
147
149
You can provide security protection for your network traffic in and out of the public internet through your gateway firewall.
148
150
149
151
1. In your Azure VMware Solution private cloud, select **VMware credentials**.
152
+
1. Locate your NSX Manager URL and credentials.
150
153
1. Sign in to NSX Manager.
151
154
1. On the NSX-T overview page, select **Gateway Policies**.
152
155
1. Select **Gateway Specific Rules**, choose the T1 gateway, and then select **Add Policy**.
Copy file name to clipboardExpand all lines: articles/azure-vmware/introduction.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -158,7 +158,7 @@ The following table provides a detailed list of roles and responsibilities betwe
158
158
| -------- | ---------------- |
159
159
| Microsoft - Azure VMware Solution | Physical infrastructure<ul><li>Azure regions</li><li>Azure availability zones</li><li>Express Route/Global Reach</ul></li>Compute/Network/Storage<ul><li>Rack and power Bare Metal hosts</li><li>Rack and power network equipment</ul></li>Private cloud deploy/lifecycle<ul><li>VMware ESXi deploy, patch, and upgrade</li><li>VMware vCenter Servers deploy, patch, and upgrade</li><li>VMware NSX-T Data Centers deploy, patch, and upgrade</li><li>VMware vSAN deploy, patch, and upgrade</ul></li>Private cloud Networking - VMware NSX-T Data Center provider config<ul><li>Microsoft Edge node/cluster, VMware NSX-T Data Center host preparation</li><li>Provider Tier-0 and Tenant Tier-1 Gateway</li><li>Connectivity from Tier-0 (using BGP) to Azure Network via ExpressRoute</ul></li>Private cloud compute - VMware vCenter Server provider config<ul><li>Create default cluster</li><li>Configure virtual networking for vMotion, Management, vSAN, and others</ul></li>Private cloud backup/restore<ul><li>Back up and restore VMware vCenter Server</li><li>Back up and restore VMware NSX-T Data Center NSX-T Manager</ul></li>Private cloud health monitoring and corrective actions, for example: replace failed hosts</br><br>(optional) VMware HCX deploys with fully configured compute profile on cloud side as add-on</br><br>(optional) VMware SRM deploys, upgrade, and scale up/down</br><br>Support - Private cloud platforms and VMware HCX |
160
160
| Customer | Request Azure VMware Solution host quote with Microsoft<br>Plan and create a request for private clouds on Azure portal with:<ul><li>Host count</li><li>Management network range</li><li>Other information</ul></li>Configure private cloud network and security (VMware NSX-T Data Center)<ul><li>Network segments to host applications</li><li>More Tier -1 routers</li><li>Firewall</li><li>VMware NSX-T Data Center LB</li><li>IPsec VPN</li><li>NAT</li><li>Public IP addresses</li><li>Distributed firewall/gateway firewall</li><li>Network extension using VMware HCX or VMware NSX-T Data Center</li><li>AD/LDAP config for RBAC</ul></li>Configure private cloud - VMware vCenter Server<ul><li>AD/LDAP config for RBAC</li><li>Deploy and lifecycle management of Virtual Machines (VMs) and application<ul><li>Install operating systems</li><li>Patch operating systems</li><li>Install antivirus software</li><li>Install backup software</li><li>Install configuration management software</li><li>Install application components</li><li>VM networking using VMware NSX-T Data Center segments</ul></li><li>Migrate Virtual Machines (VMs)<ul><li>VMware HCX configuration</li><li>Live vMotion</li><li>Cold migration</li><li>Content library sync</ul></li></ul></li>Configure private cloud - vSAN<ul><li>Define and maintain vSAN VM policies</li><li>Add hosts to maintain adequate 'slack space'</ul></li>Configure VMware HCX<ul><li>Download and deploy HCA connector OVA in on-premises</li><li>Pairing on-premises VMware HCX connector</li><li>Configure the network profile, compute profile, and service mesh</li><li>Configure VMware HCX network extension/MON</li><li>Upgrade/updates</ul></li>Network configuration to connect to on-premises, virtual network, or internet</br><br>Add or delete hosts requests to cluster from Portal</br><br>Deploy/lifecycle management of partner (third party) solutions |
161
-
| Partner ecosystem | Support for their product/solution. For reference, the following are some of the supported Azure VMware Solution partner solution/product:<ul><li>BCDR - VMware SRM, JetStream, Zerto, and others</li><li>Backup - Veeam, Commvault, Rubrik, and others</li><li>VDI - Horizon/Citrix</li><li>Multitenancy for enterprises - VMware Cloud Director Service (CDS), VMware vCloud Director Availability (VCDA)</li><li>Security solutions - BitDefender, TrendMicro, Checkpoint</li><li>Other VMware products - Aria Suite, NSX Advanced Load Balancer |
161
+
| Partner ecosystem | Support for their product/solution. For reference, the following are some of the supported Azure VMware Solution partner solution/product:<ul><li>BCDR - VMware SRM, JetStream, Zerto, and others</li><li>Backup - Veeam, Commvault, Rubrik, and others</li><li>VDI - Horizon, Citrix</li><li>Multitenancy for enterprises - VMware Cloud Director Service (CDS), VMware vCloud Director Availability (VCDA)</li><li>Security solutions - BitDefender, TrendMicro, Checkpoint</li><li>Other VMware products - Aria Suite, NSX Advanced Load Balancer |
Copy file name to clipboardExpand all lines: articles/azure-vmware/rotate-cloudadmin-credentials.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ Consider and determine which services connect to vCenter Server as *cloudadmin@v
22
22
23
23
One way to determine which services authenticate to vCenter Server with the cloudadmin user is to inspect vSphere events using the vSphere Client for your private cloud. After you identify such services, and before rotating the password, you must stop these services. Otherwise, the services won't work after you rotate the password. You can also experience temporary locks on your vCenter Server CloudAdmin account, as these services continuously attempt to authenticate using a cached version of the old credentials.
24
24
25
-
Instead of using the cloudadmin user to connect services to vCenter Server or NSX-T Data Center, we recommend individual accounts for each service. For more information about setting up separate accounts for connected services, see [Access and Identity Concepts](./concepts-identity.md).
25
+
Instead of using the cloudadmin user to connect services to vCenter Server or NSX-T, we recommend individual accounts for each service. For more information about setting up separate accounts for connected services, see [Access and Identity Concepts](./concepts-identity.md).
0 commit comments