Skip to content

Commit f898900

Browse files
authored
Merge pull request #264647 from tamram/tamram24-0122
helm quickstart: clarify acr must be unique
2 parents eba3caf + d9a7ce9 commit f898900

File tree

5 files changed

+75
-63
lines changed

5 files changed

+75
-63
lines changed

articles/aks/TOC.yml

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010
href: release-tracker.md
1111
- name: Supported Kubernetes versions
1212
href: supported-kubernetes-versions.md
13-
- name: Long Term Support
13+
- name: Long-term support
1414
href: long-term-support.md
1515
- name: Add-ons, extensions, and other integrations
1616
href: integrations.md
@@ -238,7 +238,7 @@
238238
href: cluster-configuration.md
239239
- name: Manually scale nodes in an AKS cluster
240240
href: scale-cluster.md
241-
- name: Stop an AKS cluster
241+
- name: Stop and start an AKS cluster
242242
href: start-stop-cluster.md
243243
- name: Configure private clusters
244244
items:
@@ -266,7 +266,7 @@
266266
href: istio-deploy-addon.md
267267
- name: Deploy external or internal Istio Ingress
268268
href: istio-deploy-ingress.md
269-
- name: Plug in CA certificates for Istio
269+
- name: Plug-in CA certificates for Istio
270270
href: istio-plugin-ca.md
271271
- name: Upgrade Istio service mesh add-on
272272
href: istio-upgrade.md
@@ -359,15 +359,15 @@
359359
href: use-metrics-server-vertical-pod-autoscaler.md
360360
- name: Proximity placement groups
361361
href: reduce-latency-ppg.md
362-
- name: Cluster Autoscaler
362+
- name: Cluster autoscaler
363363
items:
364-
- name: Cluster Autoscaler overview
364+
- name: Cluster autoscaler overview
365365
href: cluster-autoscaler-overview.md
366-
- name: Use the Cluster Autoscaler on AKS
366+
- name: Use the cluster autoscaler on AKS
367367
href: cluster-autoscaler.md
368368
- name: Node autoprovision
369369
href: node-autoprovision.md
370-
- name: Availability Zones
370+
- name: Availability zones
371371
href: availability-zones.md
372372
- name: Cluster management
373373
items:
@@ -393,7 +393,7 @@
393393
href: image-cleaner.md
394394
- name: Scan images in your CI/CD Workflow
395395
href: ../defender-for-cloud/defender-for-container-registries-cicd.md?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
396-
- name: Scanning images in ACR registries
396+
- name: Scan images in ACR registries
397397
href: ../defender-for-cloud/defender-for-containers-introduction.md?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
398398
- name: Cluster security
399399
items:
@@ -421,7 +421,7 @@
421421
href: use-kms-etcd-encryption.md
422422
- name: Node security
423423
items:
424-
- name: BYOK for disks
424+
- name: BYOK for Azure managed disks
425425
href: azure-disk-customer-managed-keys.md
426426
- name: Enable host-based encryption
427427
href: enable-host-encryption.md

articles/aks/azure-disk-customer-managed-keys.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
2-
title: Use a customer-managed key to encrypt Azure disks in Azure Kubernetes Service (AKS)
3-
description: Bring your own keys (BYOK) to encrypt AKS OS and Data disks.
2+
title: Use a customer-managed key to encrypt Azure managed disks in Azure Kubernetes Service (AKS)
3+
description: Bring your own keys (BYOK) to encrypt managed OS and data disks in AKS.
44
ms.topic: article
55
ms.custom: devx-track-azurecli, linux-related-content
6-
ms.date: 11/24/2023
6+
ms.date: 02/01/2024
77
---
88

9-
# Bring your own keys (BYOK) with Azure disks in Azure Kubernetes Service (AKS)
9+
# Bring your own keys (BYOK) with Azure managed disks in Azure Kubernetes Service (AKS)
1010

11-
Azure Storage encrypts all data in a storage account at rest. By default, data is encrypted with Microsoft-managed keys. For more control over encryption keys, you can supply customer-managed keys to use for encryption at rest for both the OS and data disks for your AKS clusters.
11+
Azure encrypts all data in a managed disk at rest. By default, data is encrypted with Microsoft-managed keys. For more control over encryption keys, you can supply customer-managed keys to use for encryption at rest for both the OS and data disks for your AKS clusters.
1212

1313
Learn more about customer-managed keys on [Linux][customer-managed-keys-linux] and [Windows][customer-managed-keys-windows].
1414

@@ -21,9 +21,9 @@ Learn more about customer-managed keys on [Linux][customer-managed-keys-linux] a
2121

2222
## Limitations
2323

24-
* Encryption of OS disk with customer-managed keys can only be enabled when creating an AKS cluster.
24+
* Encryption of an OS disk with customer-managed keys can only be enabled when creating an AKS cluster.
2525
* Virtual nodes are not supported.
26-
* When encrypting ephemeral OS disk-enabled node pool with customer-managed keys, if you want to rotate the key in Azure Key Vault, you need to:
26+
* When encrypting an ephemeral OS disk-enabled node pool with customer-managed keys, if you want to rotate the key in Azure Key Vault, you need to:
2727

2828
* Scale down the node pool count to 0
2929
* Rotate the key

articles/aks/concepts-clusters-workloads.md

Lines changed: 17 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -11,14 +11,19 @@ ms.date: 01/16/2024
1111
Application development continues to move toward a container-based approach, increasing our need to orchestrate and manage resources. As the leading platform, Kubernetes provides reliable scheduling of fault-tolerant application workloads. Azure Kubernetes Service (AKS), a managed Kubernetes offering, further simplifies container-based application deployment and management.
1212

1313
This article introduces core concepts:
14+
1415
* Kubernetes infrastructure components:
15-
* *control plane*
16-
* *nodes*
17-
* *node pools*
18-
* Workload resources:
19-
* *pods*
20-
* *deployments*
21-
* *sets*
16+
17+
* *control plane*
18+
* *nodes*
19+
* *node pools*
20+
21+
* Workload resources:
22+
23+
* *pods*
24+
* *deployments*
25+
* *sets*
26+
2227
* Group resources using *namespaces*.
2328

2429
## What is Kubernetes?
@@ -365,18 +370,17 @@ When you create an AKS cluster, the following namespaces are available:
365370
| *kube-system* | Where core resources exist, such as network features like DNS and proxy, or the Kubernetes dashboard. You typically don't deploy your own applications into this namespace. |
366371
| *kube-public* | Typically not used, but can be used for resources to be visible across the whole cluster, and can be viewed by any user. |
367372

368-
369373
For more information, see [Kubernetes namespaces][kubernetes-namespaces].
370374

371375
## Next steps
372376

373377
This article covers some of the core Kubernetes components and how they apply to AKS clusters. For more information on core Kubernetes and AKS concepts, see the following articles:
374378

375-
- [Kubernetes / AKS access and identity][aks-concepts-identity]
376-
- [Kubernetes / AKS security][aks-concepts-security]
377-
- [Kubernetes / AKS virtual networks][aks-concepts-network]
378-
- [Kubernetes / AKS storage][aks-concepts-storage]
379-
- [Kubernetes / AKS scale][aks-concepts-scale]
379+
- [AKS access and identity][aks-concepts-identity]
380+
- [AKS security][aks-concepts-security]
381+
- [AKS virtual networks][aks-concepts-network]
382+
- [AKS storage][aks-concepts-storage]
383+
- [AKS scale][aks-concepts-scale]
380384

381385
<!-- EXTERNAL LINKS -->
382386
[cluster-api-provider-azure]: https://github.com/kubernetes-sigs/cluster-api-provider-azure

articles/aks/long-term-support.md

Lines changed: 38 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -1,118 +1,126 @@
11
---
2-
title: Long term support for Azure Kubernetes Service (AKS)
3-
description: Learn about Azure Kubernetes Service (AKS) Long term support for Kubernetes
2+
title: Long-term support for Azure Kubernetes Service (AKS)
3+
description: Learn about Azure Kubernetes Service (AKS) long-term support for Kubernetes
44
ms.topic: article
5-
ms.date: 08/16/2023
5+
ms.date: 01/24/2024
66
ms.author: juda
77
author: justindavies
8-
#Customer intent: As a cluster operator or developer, I want to understand how Long Term Support for Kubernetes on AKS works.
8+
#Customer intent: As a cluster operator or developer, I want to understand how long-term support for Kubernetes on AKS works.
99
---
1010

11-
# Long term support
12-
The Kubernetes community releases a new minor version approximately every four months, with a support window for each version for one year. This support in terms of Azure Kubernetes Service (AKS) is called "Community Support."
11+
# Long-term support
1312

14-
AKS supports versions of Kubernetes that are within this Community Support window, to push bug fixes and security updates from community releases.
13+
The Kubernetes community releases a new minor version approximately every four months, with a support window for each version for one year. In Azure Kubernetes Service (AKS), this support window is called "Community support."
1514

16-
While innovation delivered with this release cadence provides huge benefits to you, it challenges you to keep up to date with Kubernetes releases, which can be made more difficult based on the number of AKS clusters you have to maintain.
15+
AKS supports versions of Kubernetes that are within this Community support window, to push bug fixes and security updates from community releases.
1716

17+
While innovation delivered with this release cadence provides huge benefits to you, it challenges you to keep up to date with Kubernetes releases, which can be made more difficult based on the number of AKS clusters you have to maintain.
1818

1919
## AKS support types
20-
After approximately one year, the Kubernetes version exits Community Support and your AKS clusters are now at-risk as bug fixes and security updates become unavailable.
2120

22-
AKS provides one year Community Support and one year of Long Term Support (LTS) to back port security fixes from the community upstream in our public repository. Our upstream LTS working group contributes efforts back to the community to provide our customers with a longer support window.
21+
After approximately one year, the Kubernetes version exits Community support and your AKS clusters are now at risk as bug fixes and security updates become unavailable.
22+
23+
AKS provides one year Community support and one year of long-term support (LTS) to back port security fixes from the community upstream in our public repository. Our upstream LTS working group contributes efforts back to the community to provide our customers with a longer support window.
2324

2425
LTS intends to give you an extended period of time to plan and test for upgrades over a two-year period from the General Availability of the designated Kubernetes version.
2526

26-
| | Community Support |Long Term Support |
27+
| | Community support |Long-term support |
2728
|---|---|---|
2829
| **When to use** | When you can keep up with upstream Kubernetes releases | When you need control over when to migrate from one version to another |
2930
| **Support versions** | Three GA minor versions | One Kubernetes version (currently *1.27*) for two years |
3031

32+
## Enable long-term support
3133

32-
## Enable Long Term Support
33-
34-
Enabling and disabling Long Term Support is a combination of moving your cluster to the Premium tier and explicitly selecting the LTS support plan.
34+
Enabling and disabling long-term support is a combination of moving your cluster to the Premium tier and explicitly selecting the LTS support plan.
3535

3636
> [!NOTE]
37-
> While it's possible to enable LTS when the cluster is in Community Support, you'll be charged once you enable the Premium tier.
37+
> While it's possible to enable LTS when the cluster is in Community support, you'll be charged once you enable the Premium tier.
3838
3939
### Create a cluster with LTS enabled
40-
```
40+
41+
```azurecli
4142
az aks create --resource-group myResourceGroup --name myAKSCluster --tier premium --k8s-support-plan AKSLongTermSupport --kubernetes-version 1.27
4243
```
4344

4445
> [!NOTE]
45-
> Enabling and disabling LTS is a combination of moving your cluster to the Premium tier, as well as enabling Long Term Support. Both must either be turned on or off.
46+
> Enabling and disabling LTS is a combination of moving your cluster to the Premium tier, as well as enabling long-term support. Both must either be turned on or off.
4647
4748
### Enable LTS on an existing cluster
48-
```
49+
50+
```azurecli
4951
az aks update --resource-group myResourceGroup --name myAKSCluster --tier premium --k8s-support-plan AKSLongTermSupport
5052
```
5153

5254
### Disable LTS on an existing cluster
53-
```
55+
56+
```azurecli
5457
az aks update --resource-group myResourceGroup --name myAKSCluster --tier [free|standard] --k8s-support-plan KubernetesOfficial
5558
```
5659

5760
## Long term support, add-ons and features
58-
The AKS team currently tracks add-on versions where Kubernetes community support exists. Once a version leaves Community Support, we rely on Open Source projects for managed add-ons to continue that support. Due to various external factors, some add-ons and features may not support Kubernetes versions outside these upstream Community Support windows.
61+
62+
The AKS team currently tracks add-on versions where Kubernetes Community support exists. Once a version leaves Community support, we rely on open source projects for managed add-ons to continue that support. Due to various external factors, some add-ons and features may not support Kubernetes versions outside these upstream Community support windows.
5963

6064
See the following table for a list of add-ons and features that aren't supported and the reason why.
6165

6266
| Add-on / Feature | Reason it's unsupported |
6367
---|---|
6468
| Istio | The Istio support cycle is short (six months), and there will not be maintenance releases for Kubernetes 1.27 |
6569
| Keda | Unable to guarantee future version compatibility with Kubernetes 1.27 |
66-
| Calico | Requires Calico Enterprise agreement past Community Support |
67-
| Cillium | Requires Cillium Enterprise agreement past Community Support |
70+
| Calico | Requires Calico Enterprise agreement past Community support |
71+
| Cillium | Requires Cillium Enterprise agreement past Community support |
6872
| Azure Linux | Support timeframe for Azure Linux 2 ends during this LTS cycle |
6973
| Key Management Service (KMS) | KMSv2 replaces KMS during this LTS cycle |
7074
| Dapr | AKS extensions are not supported |
7175
| Application Gateway Ingress Controller | Migration to App Gateway for Containers happens during LTS period |
7276
| Open Service Mesh | OSM will be deprecated|
7377
| AAD Pod Identity | Deprecated in place of Workload Identity |
7478

75-
7679
> [!NOTE]
77-
>You can't move your cluster to Long Term support if any of these add-ons or features are enabled.
78-
>Whilst these AKS managed add-ons aren't supported by Microsoft, you're able to install the Open Source versions of these on your cluster if you wish to use it past Community Support.
80+
>You can't move your cluster to long-term support if any of these add-ons or features are enabled.
81+
>Whilst these AKS managed add-ons aren't supported by Microsoft, you're able to install the Open Source versions of these on your cluster if you wish to use it past Community support.
7982
8083
## How we decide the next LTS version
84+
8185
Versions of Kubernetes LTS are available for two years from General Availability, we mark a later version of Kubernetes as LTS based on the following criteria:
86+
8287
* Sufficient time for customers to migrate from the prior LTS version to the current have passed
8388
* The previous version has had a two year support window
8489

8590
Read the AKS release notes to stay informed of when you're able to plan your migration.
8691

8792
### Migrate from LTS to Community support
93+
8894
Using LTS is a way to extend your window to plan a Kubernetes version upgrade. You may want to migrate to a version of Kubernetes that is within the [standard support window](supported-kubernetes-versions.md#kubernetes-version-support-policy).
8995

9096
To move from an LTS enabled cluster to a version of Kubernetes that is within the standard support window, you need to disable LTS on the cluster:
9197

92-
```
98+
```azurecli
9399
az aks update --resource-group myResourceGroup --name myAKSCluster --tier [free|standard] --k8s-support-plan KubernetesOfficial
94100
```
95101

96102
And then upgrade the cluster to a later supported version:
97103

98-
```
104+
```azurecli
99105
az aks upgrade --resource-group myResourceGroup --name myAKSCluster --kubernetes-version 1.28.3
100106
```
107+
101108
> [!NOTE]
102109
> Kubernetes 1.28.3 is used as an example here, please check the [AKS release tracker](release-tracker.md) for available Kubernetes releases.
103110
104111
There are approximately two years between one LTS version and the next. In lieu of upstream support for migrating more than two minor versions, there's a high likelihood your application depends on Kubernetes APIs that have been deprecated. We recommend you thoroughly test your application on the target LTS Kubernetes version and carry out a blue/green deployment from one version to another.
105112

106113
### Migrate from LTS to the next LTS release
107-
The upstream Kubernetes community supports a two minor version upgrade path. The process migrates the objects in your Kubernetes cluster as part of the upgrade process, and provides a tested, and accredited migration path.
114+
115+
The upstream Kubernetes community supports a two-minor-version upgrade path. The process migrates the objects in your Kubernetes cluster as part of the upgrade process, and provides a tested, and accredited migration path.
108116

109117
For customers that wish to carry out an in-place migration, the AKS service will migrate your control plane from the previous LTS version to the latest, and then migrate your data plane.
110118

111119
To carry out an in-place upgrade to the latest LTS version, you need to specify an LTS enabled Kubernetes version as the upgrade target.
112120

113-
```
121+
```azurecli
114122
az aks upgrade --resource-group myResourceGroup --name myAKSCluster --kubernetes-version 1.30.2
115123
```
116124

117125
> [!NOTE]
118-
> Kubernetes 1.30.2 is used as an example here, please check the [AKS release tracker](release-tracker.md) for available Kubernetes releases.
126+
> Kubernetes 1.30.2 is used as an example version in this article. Check the [AKS release tracker](release-tracker.md) for available Kubernetes releases.

articles/aks/quickstart-helm.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Develop on Azure Kubernetes Service (AKS) with Helm
33
description: Use Helm with AKS and Azure Container Registry to package and run application containers in a cluster.
44
ms.topic: article
55
ms.custom: devx-track-azurecli, devx-track-azurepowershell
6-
ms.date: 01/18/2024
6+
ms.date: 01/25/2024
77
---
88

99
# Quickstart: Develop on Azure Kubernetes Service (AKS) with Helm
@@ -30,7 +30,7 @@ You need to store your container images in an Azure Container Registry (ACR) to
3030
az group create --name myResourceGroup --location eastus
3131
```
3232
33-
2. Create an Azure Container Registry using the [az acr create][az-acr-create] command. The following example creates an ACR named *myhelmacr* with the *Basic* SKU.
33+
2. Create an Azure Container Registry with a unique name by calling the [az acr create][az-acr-create] command. The following example creates an ACR named *myhelmacr* with the *Basic* SKU.
3434
3535
```azurecli-interactive
3636
az acr create --resource-group myResourceGroup --name myhelmacr --sku Basic
@@ -68,10 +68,10 @@ You need to store your container images in an Azure Container Registry (ACR) to
6868
New-AzResourceGroup -Name myResourceGroup -Location eastus
6969
```
7070
71-
2. Create an Azure Container Registry using the [New-AzContainerRegistry][new-azcontainerregistry] cmdlet. The following example creates an ACR named *myhelmacr* with the *Basic* SKU.
71+
2. Create an Azure Container Registry with a unique name by calling the [New-AzContainerRegistry][new-azcontainerregistry] cmdlet. The following example creates an ACR named *myhelmacr* with the *Basic* SKU.
7272
7373
```azurepowershell-interactive
74-
New-AzContainerRegistry -ResourceGroupName myResourceGroup -Name myhelmacr -Sku Basic
74+
New-AzContainerRegistry -ResourceGroupName myResourceGroup -Name myhelmacr -Sku Basic -Location eastus
7575
```
7676
7777
Your output should look similar to the following condensed example output. Take note of your *loginServer* value for your ACR to use in a later step.

0 commit comments

Comments
 (0)