You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/node-access.md
+2-33Lines changed: 2 additions & 33 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Connect to Azure Kubernetes Service (AKS) cluster nodes
3
3
description: Learn how to connect to Azure Kubernetes Service (AKS) cluster nodes for troubleshooting and maintenance tasks.
4
4
services: container-service
5
5
ms.topic: article
6
-
ms.date: 11/1/2022
6
+
ms.date: 11/3/2022
7
7
8
8
ms.custom: contperf-fy21q4
9
9
@@ -14,7 +14,7 @@ ms.custom: contperf-fy21q4
14
14
15
15
Throughout the lifecycle of your Azure Kubernetes Service (AKS) cluster, you might need to access an AKS node. This access could be for maintenance, log collection, or troubleshooting operations. You can securely authenticate against AKS Linux and Windows nodes using SSH, and you can also [connect to Windows Server nodes using remote desktop protocol (RDP)][aks-windows-rdp]. For security reasons, the AKS nodes aren't exposed to the internet. To connect to the AKS nodes, you use `kubectl debug` or the private IP address.
16
16
17
-
This article shows you how to create a connection to an AKS node and update the SSH key on an existing AKS cluster.
17
+
This article shows you how to create a connection to an AKS node.
18
18
19
19
## Before you begin
20
20
@@ -163,37 +163,6 @@ When done, `exit` the SSH session, stop any port forwarding, and then `exit` the
163
163
kubectl delete pod node-debugger-aks-nodepool1-12345678-vmss000000-bkmmx
164
164
```
165
165
166
-
## Update SSH key on an existing AKS cluster (preview)
167
-
168
-
### Prerequisites
169
-
* Before you start, ensure the Azure CLI is installed and configured. If you need to install or upgrade, see [Install Azure CLI][install-azure-cli].
170
-
* The aks-preview extension version 0.5.111 or later. To learn how to install an Azure extension, see [How to install extensions][how-to-install-azure-extensions].
171
-
172
-
> [!NOTE]
173
-
> Updating of the SSH key is supported on Azure virtual machine scale sets with AKS clusters.
174
-
175
-
Use the [az aks update][az-aks-update] command to update the SSH key on the cluster. This operation will update the key on all node pools. You can either specify the key or a key file using the `--ssh-key-value` argument.
176
-
177
-
```azurecli
178
-
az aks update --name myAKSCluster --resource-group MyResourceGroup --ssh-key-value <new SSH key value or SSH key file>
179
-
```
180
-
181
-
Examples:
182
-
In the following example, you can specify the new SSH key value for the `--ssh-key-value` argument.
183
-
184
-
```azurecli
185
-
az aks update --name myAKSCluster --resource-group MyResourceGroup --ssh-key-value 'ssh-rsa AAAAB3Nza-xxx'
186
-
```
187
-
188
-
In the following example, you specify a SSH key file.
189
-
190
-
```azurecli
191
-
az aks update --name myAKSCluster --resource-group MyResourceGroup --ssh-key-value .ssh/id_rsa.pub
192
-
```
193
-
194
-
> [!IMPORTANT]
195
-
> During this operation, all virtual machine scale set instances are upgraded and re-imaged to use the new SSH key.
196
-
197
166
## Next steps
198
167
199
168
If you need more troubleshooting data, you can [view the kubelet logs][view-kubelet-logs] or [view the Kubernetes master node logs][view-master-logs].
Copy file name to clipboardExpand all lines: articles/aks/use-pod-security-policies.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,8 +8,8 @@ ms.date: 03/25/2021
8
8
9
9
# Preview - Secure your cluster using pod security policies in Azure Kubernetes Service (AKS)
10
10
11
-
[!Important]
12
-
The feature described in this document, pod security policy (preview), will begin deprecation with Kubernetes version 1.21, with its removal in version 1.25. AKS will mark Pod Security Policy as "Deprecated" in the AKS API on 04-01-2023. You can now Migrate Pod Security Policy to Pod Security Admission Controller ahead of the deprecation.
11
+
> [!Important]
12
+
> The feature described in this article, pod security policy (preview), will be deprecated starting with Kubernetes version 1.21, and it will be removed in version 1.25. AKS will mark the pod security policy as Deprecated with the AKS API on 04-01-2023. You can migrate pod security policy to pod security admission controller before the deprecation deadline.
13
13
14
14
After pod security policy (preview) is deprecated, you must have already migrated to Pod Security Admission controller or disabled the feature on any existing clusters using the deprecated feature to perform future cluster upgrades and stay within Azure support.
Copy file name to clipboardExpand all lines: articles/azure-functions/python-scale-performance-reference.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -112,7 +112,7 @@ You can set the value of maximum workers allowed for running sync functions usin
112
112
113
113
For CPU-bound apps, you should keep the setting to a low number, starting from 1 and increasing as you experiment with your workload. This suggestion is to reduce the time spent on context switches and allowing CPU-bound tasks to finish.
114
114
115
-
For I/O-bound apps, you should see substantial gains by increasing the number of threads working on each invocation. the recommendation is to start with the Python default - the number of cores + 4 and then tweak based on the throughput values you're seeing.
115
+
For I/O-bound apps, you should see substantial gains by increasing the number of threads working on each invocation. the recommendation is to start with the Python default (the number of cores) + 4 and then tweak based on the throughput values you're seeing.
116
116
117
117
For mix workloads apps, you should balance both `FUNCTIONS_WORKER_PROCESS_COUNT` and `PYTHON_THREADPOOL_THREAD_COUNT` configurations to maximize the throughput. To understand what your function apps spend the most time on, we recommend profiling them and set the values according to the behavior they present. Also refer to this [section](#use-multiple-language-worker-processes) to learn about FUNCTIONS_WORKER_PROCESS_COUNT application settings.
0 commit comments