Skip to content

Commit d9fe5ca

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into us1971568c
2 parents 6dee5e8 + 00fcfa3 commit d9fe5ca

File tree

492 files changed

+5263
-2975
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

492 files changed

+5263
-2975
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -415,6 +415,16 @@
415415
"source_path_from_root": "/articles/azure-monitor/insights/cosmosdb-insights-overview.md" ,
416416
"redirect_url": "/azure/cosmos-db/cosmosdb-insights-overview",
417417
"redirect_document_id": false
418+
},
419+
{
420+
"source_path_from_root": "/articles/azure-monitor/insights/network-insights-overview.md" ,
421+
"redirect_url": "/azure/network-watcher/network-insights-overview",
422+
"redirect_document_id": false
423+
},
424+
{
425+
"source_path_from_root": "/articles/azure-monitor/insights/key-vault-insights-overview.md" ,
426+
"redirect_url": "/azure/key-vault/key-vault-insights-overview",
427+
"redirect_document_id": false
418428
}
419429
]
420430
}

articles/active-directory/fundamentals/security-operations-privileged-accounts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ The log files you use for investigation and monitoring are:
3434

3535
* [Azure AD Audit logs](../reports-monitoring/concept-audit-logs.md)
3636
* [Microsoft 365 Audit logs](/microsoft-365/compliance/auditing-solutions-overview)
37-
* [Azure Key Vault insights](../../azure-monitor/insights/key-vault-insights-overview.md)
37+
* [Azure Key Vault insights](../../key-vault/key-vault-insights-overview.md)
3838

3939
From the Azure portal, you can view the Azure AD Audit logs and download as comma-separated value (CSV) or JavaScript Object Notation (JSON) files. The Azure portal has several ways to integrate Azure AD logs with other tools that allow for greater automation of monitoring and alerting:
4040

articles/active-directory/roles/security-emergency-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ Some organizations use AD Domain Services and AD FS or similar identity provider
8989

9090
## Store account credentials safely
9191

92-
Organizations need to ensure that the credentials for emergency access accounts are kept secure and known only to individuals who are authorized to use them. Some customers use a smartcard and others use passwords. A password for an emergency access account is usually separated into two or three parts, written on separate pieces of paper, and stored in secure, fireproof safes that are in secure, separate locations.
92+
Organizations need to ensure that the credentials for emergency access accounts are kept secure and known only to individuals who are authorized to use them. Some customers use a smartcard for Windows Server AD, a [FIDO2 security key](../authentication/howto-authentication-passwordless-security-key.md) for Azure AD and others use passwords. A password for an emergency access account is usually separated into two or three parts, written on separate pieces of paper, and stored in secure, fireproof safes that are in secure, separate locations.
9393

9494
If using passwords, make sure the accounts have strong passwords that do not expire the password. Ideally, the passwords should be at least 16 characters long and randomly generated.
9595

articles/advisor/advisor-alerts-bicep.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
22
title: Create Azure Advisor alerts for new recommendations using Bicep
33
description: Learn how to set up an alert for new recommendations from Azure Advisor using Bicep.
4-
author: schaffererin
4+
author: orspod
55
ms.topic: quickstart
6-
ms.author: v-eschaffer
6+
ms.author: orspodek
77
ms.custom: subject-armqs, devx-track-azurepowershell, mode-arm
88
ms.date: 04/26/2022
99
---

articles/aks/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -297,6 +297,8 @@
297297
href: azure-disk-customer-managed-keys.md
298298
- name: Enable host-based encryption
299299
href: enable-host-encryption.md
300+
- name: Enable FIPS
301+
href: enable-fips-nodes.md
300302
- name: Application security
301303
items:
302304
- name: Use Azure AD pod identity (preview)

articles/aks/enable-fips-nodes.md

Lines changed: 135 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,135 @@
1+
---
2+
title: Enable Federal Information Process Standard (FIPS) for Azure Kubernetes Service (AKS) node pools
3+
description: Learn how to enable Federal Information Process Standard (FIPS) for Azure Kubernetes Service (AKS) node pools.
4+
author: erik-ha-msft
5+
ms.author: erikha
6+
ms.service: container-service
7+
ms.topic: how-to
8+
ms.date: 07/19/2022
9+
ms.custom: template-how-to
10+
---
11+
12+
# Enable Federal Information Process Standard (FIPS) for Azure Kubernetes Service (AKS) node pools
13+
14+
The Federal Information Processing Standard (FIPS) 140-2 is a US government standard that defines minimum security requirements for cryptographic modules in information technology products and systems. Azure Kubernetes Service (AKS) allows you to create Linux and Windows node pools with FIPS 140-2 enabled. Deployments running on FIPS-enabled node pools can use those cryptographic modules to provide increased security and help meet security controls as part of FedRAMP compliance. For more information on FIPS 140-2, see [Federal Information Processing Standard (FIPS) 140][fips].
15+
16+
## Prerequisites
17+
18+
You need the Azure CLI version 2.32.0 or later installed and configured. Run `az --version` to find the version. For more information about installing or upgrading the Azure CLI, see [Install Azure CLI][install-azure-cli].
19+
20+
FIPS-enabled node pools have the following limitations:
21+
22+
* FIPS-enabled node pools require Kubernetes version 1.19 and greater.
23+
* To update the underlying packages or modules used for FIPS, you must use [Node Image Upgrade][node-image-upgrade].
24+
* Container images on the FIPS nodes haven't been assessed for FIPS compliance.
25+
26+
> [!IMPORTANT]
27+
> The FIPS-enabled Linux image is a different image than the default Linux image used for Linux-based node pools. To enable FIPS on a node pool, you must create a new Linux-based node pool. You can't enable FIPS on existing node pools.
28+
>
29+
> FIPS-enabled node images may have different version numbers, such as kernel version, than images that are not FIPS-enabled. Also, the update cycle for FIPS-enabled node pools and node images may differ from node pools and images that are not FIPS-enabled.
30+
31+
## Create a FIPS-enabled Linux node pool
32+
33+
To create a FIPS-enabled Linux node pool, use the [az aks nodepool add][az-aks-nodepool-add] command with the `--enable-fips-image` parameter when creating a node pool.
34+
35+
```azurecli-interactive
36+
az aks nodepool add \
37+
--resource-group myResourceGroup \
38+
--cluster-name myAKSCluster \
39+
--name fipsnp \
40+
--enable-fips-image
41+
```
42+
43+
> [!NOTE]
44+
> You can also use the `--enable-fips-image` parameter with [az aks create][az-aks-create] when creating a cluster to enable FIPS on the default node pool. When adding node pools to a cluster created in this way, you still must use the `--enable-fips-image` parameter when adding node pools to create a FIPS-enabled node pool.
45+
46+
To verify your node pool is FIPS-enabled, use [az aks show][az-aks-show] to check the *enableFIPS* value in *agentPoolProfiles*.
47+
48+
```azurecli-interactive
49+
az aks show \
50+
--resource-group myResourceGroup \
51+
--name myAKSCluster \
52+
--query="agentPoolProfiles[].{Name:name enableFips:enableFips}" \
53+
-o table
54+
```
55+
56+
The following example output shows the *fipsnp* node pool is FIPS-enabled and *nodepool1* isn't.
57+
58+
```output
59+
Name enableFips
60+
--------- ------------
61+
fipsnp True
62+
nodepool1 False
63+
```
64+
65+
You can also verify deployments have access to the FIPS cryptographic libraries using `kubectl debug` on a node in the FIPS-enabled node pool. Use `kubectl get nodes` to list the nodes:
66+
67+
```output
68+
$ kubectl get nodes
69+
NAME STATUS ROLES AGE VERSION
70+
aks-fipsnp-12345678-vmss000000 Ready agent 6m4s v1.19.9
71+
aks-fipsnp-12345678-vmss000001 Ready agent 5m21s v1.19.9
72+
aks-fipsnp-12345678-vmss000002 Ready agent 6m8s v1.19.9
73+
aks-nodepool1-12345678-vmss000000 Ready agent 34m v1.19.9
74+
```
75+
76+
In the above example, the nodes starting with `aks-fipsnp` are part of the FIPS-enabled node pool. Use `kubectl debug` to run a deployment with an interactive session on one of those nodes in the FIPS-enabled node pool.
77+
78+
```azurecli-interactive
79+
kubectl debug node/aks-fipsnp-12345678-vmss000000 -it --image=mcr.microsoft.com/dotnet/runtime-deps:6.0
80+
```
81+
82+
From the interactive session, you can verify the FIPS cryptographic libraries are enabled:
83+
84+
```output
85+
root@aks-fipsnp-12345678-vmss000000:/# cat /proc/sys/crypto/fips_enabled
86+
1
87+
```
88+
89+
FIPS-enabled node pools also have a *kubernetes.azure.com/fips_enabled=true* label, which can be used by deployments to target those node pools.
90+
91+
## Create a FIPS-enabled Windows node pool
92+
93+
To create a FIPS-enabled Windows node pool, use the [az aks nodepool add][az-aks-nodepool-add] command with the `--enable-fips-image` parameter when creating a node pool. Unlike Linux-based node pools, Windows node pools share the same image set.
94+
95+
```azurecli-interactive
96+
az aks nodepool add \
97+
--resource-group myResourceGroup \
98+
--cluster-name myAKSCluster \
99+
--name fipsnp \
100+
--enable-fips-image \
101+
--os-type Windows
102+
```
103+
104+
To verify your node pool is FIPS-enabled, use [az aks show][az-aks-show] to check the *enableFIPS* value in *agentPoolProfiles*.
105+
106+
```azurecli-interactive
107+
az aks show \
108+
--resource-group myResourceGroup \
109+
--name myAKSCluster \
110+
--query="agentPoolProfiles[].{Name:name enableFips:enableFips}" \
111+
-o table
112+
```
113+
114+
To verify Windows node pools have access to the FIPS cryptographic libraries, [create an RDP connection to a Windows node][aks-rdp] in a FIPS-enabled node pool and check the registry.
115+
116+
1. From the **Run** application, enter `regedit`.
117+
1. Look for `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\FIPSAlgorithmPolicy` in the registry.
118+
1. If `Enabled` is set to 1, then FIPS is enabled.
119+
120+
:::image type="content" source="./media/enable-fips-nodes/enable-fips-nodes-windows.png" alt-text="Screenshot shows a picture of the registry editor to the FIPS Algorithm Policy, and it being enabled.":::
121+
122+
FIPS-enabled node pools also have a *kubernetes.azure.com/fips_enabled=true* label, which can be used by deployments to target those node pools.
123+
124+
## Next steps
125+
126+
To learn more about AKS security, see [Best practices for cluster security and upgrades in Azure Kubernetes Service (AKS)][aks-best-practices-security].
127+
128+
<!-- LINKS - Internal -->
129+
[az-aks-nodepool-add]: /cli/azure/aks/nodepool#az-aks-nodepool-add
130+
[az-aks-show]: /cli/azure/aks#az_aks_show
131+
[aks-best-practices-security]: operator-best-practices-cluster-security.md
132+
[aks-rdp]: rdp.md
133+
[fips]: /azure/compliance/offerings/offering-fips-140-2
134+
[install-azure-cli]: /cli/azure/install-azure-cli
135+
[node-image-upgrade]: node-image-upgrade.md

articles/aks/index.yml

Lines changed: 35 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,21 @@ landingContent:
2424
links:
2525
- text: What is AKS?
2626
url: intro-kubernetes.md
27+
- linkListType: whats-new
28+
links:
29+
- text: Automatically upgrade an AKS cluster
30+
url: auto-upgrade-cluster.md
31+
- text: Start/stop node pools
32+
url: start-stop-nodepools.md
33+
- text: Default OS disk sizing
34+
url: cluster-configuration.md#default-os-disk-sizing
35+
- text: Bring your own CNI plugin (GA)
36+
url: use-byo-cni.md
37+
- text: Calico for Windows Server containers (GA)
38+
url: use-network-policies.md#create-an-aks-cluster-for-calico-network-policies
39+
- text: API Server VNet integration (preview)
40+
url: api-server-vnet-integration.md
41+
2742
- linkListType: concept
2843
links:
2944
- text: Kubernetes core concepts for AKS
@@ -99,26 +114,6 @@ landingContent:
99114
- text: Other AKS solutions
100115
url: /azure/architecture/reference-architectures/containers/aks-start-here?WT.mc_id=AKSDOCSPAGE
101116

102-
# Card
103-
- title: Deploy, manage, and update applications
104-
linkLists:
105-
- linkListType: tutorial
106-
links:
107-
- text: 1. Prepare an application for AKS
108-
url: tutorial-kubernetes-prepare-app.md
109-
- text: 2. Deploy and use Azure Container Registry
110-
url: tutorial-kubernetes-prepare-acr.md
111-
- text: 3. Deploy an AKS cluster
112-
url: tutorial-kubernetes-deploy-cluster.md
113-
- text: 4. Run your application
114-
url: tutorial-kubernetes-deploy-application.md
115-
- text: 5. Scale applications
116-
url: tutorial-kubernetes-scale.md
117-
- text: 6. Update an application
118-
url: tutorial-kubernetes-app-update.md
119-
- text: 7. Upgrade Kubernetes in AKS
120-
url: tutorial-kubernetes-upgrade-cluster.md
121-
122117
- title: Configure your cluster for Windows containers
123118
linkLists:
124119
- linkListType: quickstart
@@ -156,6 +151,26 @@ landingContent:
156151
- text: Windows Server containers FAQ
157152
url: windows-faq.md
158153

154+
# Card
155+
- title: Deploy, manage, and update applications
156+
linkLists:
157+
- linkListType: tutorial
158+
links:
159+
- text: 1. Prepare an application for AKS
160+
url: tutorial-kubernetes-prepare-app.md
161+
- text: 2. Deploy and use Azure Container Registry
162+
url: tutorial-kubernetes-prepare-acr.md
163+
- text: 3. Deploy an AKS cluster
164+
url: tutorial-kubernetes-deploy-cluster.md
165+
- text: 4. Run your application
166+
url: tutorial-kubernetes-deploy-application.md
167+
- text: 5. Scale applications
168+
url: tutorial-kubernetes-scale.md
169+
- text: 6. Update an application
170+
url: tutorial-kubernetes-app-update.md
171+
- text: 7. Upgrade Kubernetes in AKS
172+
url: tutorial-kubernetes-upgrade-cluster.md
173+
159174
- title: Extend the capabilities of your cluster
160175
linkLists:
161176
- linkListType: concept

articles/aks/learn/quick-kubernetes-deploy-rm-template.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -63,8 +63,6 @@ For more information about creating SSH keys, see [Create and manage SSH keys fo
6363

6464
The template used in this quickstart is from [Azure Quickstart templates](https://azure.microsoft.com/resources/templates/aks/).
6565

66-
:::code language="json" source="~/quickstart-templates/quickstarts/microsoft.kubernetes/aks/azuredeploy.json":::
67-
6866
For more AKS samples, see the [AKS quickstart templates][aks-quickstart-templates] site.
6967

7068
## Deploy the template
33.4 KB
Loading

0 commit comments

Comments
 (0)