Skip to content

Commit f3c717c

Browse files
authored
Merge pull request #245577 from schaffererin/splitupaksusemultiplenodepoolsdoc
Split existing use-multiple-node-pools doc into two separate docs
2 parents 5313241 + cead193 commit f3c717c

32 files changed

+985
-930
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24113,6 +24113,11 @@
2411324113
"redirect_url": "/azure/private-link/create-private-endpoint-portal",
2411424114
"redirect_document_id": false
2411524115
},
24116+
{
24117+
"source_path_from_root": "/articles/aks/use-multiple-node-pools.md",
24118+
"redirect_url": "/azure/aks/create-node-pools",
24119+
"redirect_document_id": false
24120+
},
2411624121
{
2411724122
"source_path_from_root": "/articles/reliability/migrate-app-service.md",
2411824123
"redirect_url": "/azure/reliability/reliability-app-service",

articles/advisor/advisor-reference-operational-excellence-recommendations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ Learn more about [Kubernetes service - EnableClusterAutoscaler (Enable the Clust
180180

181181
Some of the subnets for this cluster's node pools are full and cannot take any more worker nodes. Using the Azure CNI plugin requires to reserve IP addresses for each node and all the pods for the node at node provisioning time. If there is not enough IP address space in the subnet, no worker nodes can be deployed. Additionally, the AKS cluster cannot be upgraded if the node subnet is full.
182182

183-
Learn more about [Kubernetes service - NodeSubnetIsFull (The AKS node pool subnet is full)](../aks/use-multiple-node-pools.md#add-a-node-pool-with-a-unique-subnet).
183+
Learn more about [Kubernetes service - NodeSubnetIsFull (The AKS node pool subnet is full)](../aks/create-node-pools.md#add-a-node-pool-with-a-unique-subnet).
184184

185185
### Disable the Application Routing Addon
186186

articles/aks/TOC.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -279,8 +279,10 @@
279279
items:
280280
- name: Node pool snapshot
281281
href: node-pool-snapshot.md
282-
- name: Use multiple node pools
283-
href: use-multiple-node-pools.md
282+
- name: Create node pools
283+
href: create-node-pools.md
284+
- name: Manage node pools
285+
href: manage-node-pools.md
284286
- name: Use spot node pools
285287
href: spot-node-pool.md
286288
- name: Use system node pools

articles/aks/aks-migration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ AKS is a managed service offering unique capabilities with lower management over
4747

4848
We recommend using AKS clusters backed by [Virtual Machine Scale Sets](../virtual-machine-scale-sets/index.yml) and the [Azure Standard Load Balancer](./load-balancer-standard.md) to ensure you get the following features:
4949

50-
* [Multiple node pools](./use-multiple-node-pools.md),
50+
* [Multiple node pools](./create-node-pools.md),
5151
* [Availability zones](../reliability/availability-zones-overview.md),
5252
* [Authorized IP ranges](./api-server-authorized-ip-ranges.md),
5353
* [Cluster autoscaler](./cluster-autoscaler.md),

articles/aks/cluster-autoscaler.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -286,7 +286,7 @@ To further help improve cluster resource utilization and free up CPU and memory
286286
287287
<!-- LINKS - internal -->
288288
[aks-faq-node-resource-group]: faq.md#can-i-modify-tags-and-other-properties-of-the-aks-resources-in-the-node-resource-group
289-
[aks-multiple-node-pools]: use-multiple-node-pools.md
289+
[aks-multiple-node-pools]: create-node-pools.md
290290
[aks-scale-apps]: tutorial-kubernetes-scale.md
291291
[aks-view-master-logs]: ../azure-monitor/containers/monitor-kubernetes.md#configure-monitoring
292292
[azure-cli-install]: /cli/azure/install-azure-cli

articles/aks/concepts-clusters-workloads.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -148,7 +148,7 @@ Nodes of the same configuration are grouped together into *node pools*. A Kubern
148148
149149
You scale or upgrade an AKS cluster against the default node pool. You can choose to scale or upgrade a specific node pool. For upgrade operations, running containers are scheduled on other nodes in the node pool until all the nodes are successfully upgraded.
150150

151-
For more information about how to use multiple node pools in AKS, see [Create and manage multiple node pools for a cluster in AKS][use-multiple-node-pools].
151+
For more information about how to use multiple node pools in AKS, see [Create multiple node pools for a cluster in AKS][use-multiple-node-pools].
152152

153153
### Node selectors
154154

@@ -379,7 +379,7 @@ This article covers some of the core Kubernetes components and how they apply to
379379
[aks-helm]: kubernetes-helm.md
380380
[operator-best-practices-cluster-security]: operator-best-practices-cluster-security.md
381381
[operator-best-practices-scheduler]: operator-best-practices-scheduler.md
382-
[use-multiple-node-pools]: use-multiple-node-pools.md
382+
[use-multiple-node-pools]: create-node-pools.md
383383
[operator-best-practices-advanced-scheduler]: operator-best-practices-advanced-scheduler.md
384384
[reservation-discounts]:../cost-management-billing/reservations/save-compute-costs-reservations.md
385385
[configure-nrg]: ./cluster-configuration.md#fully-managed-resource-group-preview

articles/aks/concepts-vulnerability-management.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Microsoft identifies and patches vulnerabilities and missing security updates fo
2727

2828
## AKS Container Images
2929

30-
While the [Cloud Native Computing Foundation][cloud-native-computing-foundation] (CNCF) owns and maintains most of the code running in AKS, Microsoft takes responsibility for building the open-source packages that we deploy on AKS. With that responsibility, it includes having complete ownership of the build, scan, sign, validate, and hotfix process and control over the binaries in container images. By us having responsibility for building the open-source packages deployed on AKS, it enables us to both establish a software supply chain over the binary, and patch the software as needed.  
30+
While the [Cloud Native Computing Foundation][cloud-native-computing-foundation] (CNCF) owns and maintains most of the code AKS runs, Microsoft takes responsibility for building the open-source packages we deploy on AKS. With that responsibility, it includes having complete ownership of the build, scan, sign, validate, and hotfix process and control over the binaries in container images. By us having responsibility for building the open-source packages deployed on AKS, it enables us to both establish a software supply chain over the binary, and patch the software as needed.  
3131

3232
Microsoft is active in the broader Kubernetes ecosystem to help build the future of cloud-native compute in the wider CNCF community. This work not only ensures the quality of every Kubernetes release for the world, but also enables AKS quickly get new Kubernetes releases out into production for several years. In some cases, ahead of other cloud providers by several months. Microsoft collaborates with other industry partners in the Kubernetes security organization. For example, the Security Response Committee (SRC) receives, prioritizes, and patches embargoed security vulnerabilities before they're  announced to the public. This commitment ensures Kubernetes is secure for everyone, and enables AKS to patch and respond to vulnerabilities faster to keep our customers safe. In addition to Kubernetes, Microsoft has signed up to receive pre-release notifications for software vulnerabilities for products such as Envoy, container runtimes, and many other open-source projects.
3333

@@ -51,7 +51,7 @@ Each evening, Linux nodes in AKS receive security patches through their distribu
5151

5252
Nightly, we apply security updates to the OS on the node, but the node image used to create nodes for your cluster remains unchanged. If a new Linux node is added to your cluster, the original image is used to create the node. This new node receives all the security and kernel updates available during the automatic assessment performed every night, but remains unpatched until all checks and restarts are complete. You can use node image upgrade to check for and update node images used by your cluster. For more information on node image upgrade, see [Azure Kubernetes Service (AKS) node image upgrade][aks-node-image-upgrade].
5353

54-
For AKS clusters on the [OS auto upgrade][aks-node-image-upgrade] channel, the unattended upgrade process is disabled, and the OS nodes will receive security updates through the weekly node image upgrade.
54+
For AKS clusters on the [OS auto upgrade][aks-node-image-upgrade] channel, the unattended upgrade process is disabled, and the OS nodes receives security updates through the weekly node image upgrade.
5555

5656
### Windows Server nodes
5757

@@ -74,9 +74,9 @@ The following table describes vulnerability severity categories:
7474

7575
## How vulnerabilities are updated
7676

77-
AKS patches CVE's that has a *vendor fix* every week. CVE's without a fix are waiting on a *vendor fix* before it can be remediated. The fixed container images are cached in the next corresponding Virtual Hard Disk (VHD) build, which also contains the updated Ubuntu/Azure Linux/Windows patched CVE's. As long as you're running the updated VHD, you shouldn't be running any container image CVE's with a vendor fix that is over 30 days old.
77+
AKS patches CVEs that has a *vendor fix* every week. CVEs without a fix are waiting on a *vendor fix* before it can be remediated. The fixed container images are cached in the next corresponding Virtual Hard Disk (VHD) build, which also contains the updated Ubuntu/Azure Linux/Windows patched CVEs. As long as you're running the updated VHD, you shouldn't be running any container image CVEs with a vendor fix that is over 30 days old.
7878

79-
For the OS-based vulnerabilities in the VHD, AKS uses **Unattended Update** by default, so any security updates should be applied to the existing VHD's daily. If **Unattended Update** is disabled, then it's a recommended best practice that you apply a Node Image update on a regular cadence to ensure the latest OS and Image security updates are applied.
79+
For the OS-based vulnerabilities in the VHD, AKS uses **Unattended Update** by default, so any security updates should be applied to the existing VHDs daily. If **Unattended Update** is disabled, then it's a recommended best practice that you apply a Node Image update on a regular cadence to ensure the latest OS and Image security updates are applied.
8080

8181
## Update release timelines
8282

@@ -121,7 +121,7 @@ See the overview about [Upgrading Azure Kubernetes Service clusters and node poo
121121
[microsoft-azure-fedramp-high]: ../azure-government/compliance/azure-services-in-fedramp-auditscope.md#azure-government-services-by-audit-scope
122122
[apply-security-kernel-updates-to-aks-nodes]: node-updates-kured.md
123123
[aks-node-image-upgrade]: node-image-upgrade.md
124-
[upgrade-node-pool-in-aks]: use-multiple-node-pools.md#upgrade-a-node-pool
124+
[upgrade-node-pool-in-aks]: manage-node-pools.md#upgrade-a-single-node-pool
125125
[aks-node-image-upgrade]: auto-upgrade-node-image.md
126126

127127
<!-- LINKS - external -->

articles/aks/configure-azure-cni.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -216,7 +216,7 @@ Learn more about networking in AKS in the following articles:
216216
[az-feature-list]: /cli/azure/feature#az_feature_list
217217
[az-provider-register]: /cli/azure/provider#az_provider_register
218218
[network-policy]: use-network-policies.md
219-
[nodepool-upgrade]: use-multiple-node-pools.md#upgrade-a-node-pool
219+
[nodepool-upgrade]: manage-node-pools.md#upgrade-a-single-node-pool
220220
[network-comparisons]: concepts-network.md#compare-network-models
221221
[system-node-pools]: use-system-pools.md
222222
[prerequisites]: configure-azure-cni.md#prerequisites

0 commit comments

Comments
 (0)