Skip to content

Commit fc1cdfc

Browse files
authored
Merge pull request #263051 from MGoedtel/task198966
Updated concepts-security
2 parents 7c9be48 + 08c39f3 commit fc1cdfc

File tree

2 files changed

+3
-22
lines changed

2 files changed

+3
-22
lines changed

articles/aks/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -105,14 +105,14 @@
105105
href: network-observability-overview.md
106106
- name: Security
107107
items:
108+
- name: Security concepts
109+
href: concepts-security.md
108110
- name: Access and identity
109111
href: concepts-identity.md
110112
- name: Security vulnerability management
111113
href: concepts-vulnerability-management.md
112114
- name: Security Baseline
113115
href: /security/benchmark/azure/baselines/aks-security-baseline?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
114-
- name: Container Security
115-
href: concepts-security.md
116116
- name: Confidential Containers security policy
117117
href: ../confidential-computing/confidential-containers-aks-security-policy.md?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
118118
- name: Security controls by Azure Policy

articles/aks/concepts-security.md

Lines changed: 1 addition & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about security in Azure Kubernetes Service (AKS), including m
44
author: miwithro
55
ms.topic: conceptual
66
ms.custom: build-2023
7-
ms.date: 10/31/2023
7+
ms.date: 01/11/2024
88
ms.author: miwithro
99
---
1010

@@ -82,25 +82,6 @@ Because of compliance or regulatory requirements, certain workloads may require
8282
* [Confidential Containers][confidential-containers] (preview), also based on Kata Confidential Containers, encrypts container memory and prevents data in memory during computation from being in clear text, readable format, and tampering. It helps isolate your containers from other container groups/pods, as well as VM node OS kernel. Confidential Containers (preview) uses hardware based memory encryption (SEV-SNP).
8383
* [Pod Sandboxing][pod-sandboxing] (preview) provides an isolation boundary between the container application and the shared kernel and compute resources (CPU, memory, and network) of the container host.
8484

85-
## Cluster upgrades
86-
87-
Azure provides upgrade orchestration tools to upgrade of an AKS cluster and components, maintain security and compliance, and access the latest features. This upgrade orchestration includes both the Kubernetes master and agent components.
88-
89-
To start the upgrade process, specify one of the [listed available Kubernetes versions](supported-kubernetes-versions.md). Azure then safely cordons and drains each AKS node and upgrades.
90-
91-
### Cordon and drain
92-
93-
During the upgrade process, AKS nodes are individually cordoned from the cluster to prevent new pods from being scheduled on them. The nodes are then drained and upgraded as follows:
94-
95-
1. A new node is deployed into the node pool.
96-
* This node runs the latest OS image and patches.
97-
1. One of the existing nodes is identified for upgrade.
98-
1. Pods on the identified node are gracefully terminated and scheduled on the other nodes in the node pool.
99-
1. The emptied node is deleted from the AKS cluster.
100-
1. Steps 1-4 are repeated until all nodes are successfully replaced as part of the upgrade process.
101-
102-
For more information, see [Upgrade an AKS cluster][aks-upgrade-cluster].
103-
10485
## Network security
10586

10687
For connectivity and security with on-premises networks, you can deploy your AKS cluster into existing Azure virtual network subnets. These virtual networks connect back to your on-premises network using Azure Site-to-Site VPN or Express Route. Define Kubernetes ingress controllers with private, internal IP addresses to limit services access to the internal network connection.

0 commit comments

Comments
 (0)