You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/concepts-security.md
+1-20Lines changed: 1 addition & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn about security in Azure Kubernetes Service (AKS), including m
4
4
author: miwithro
5
5
ms.topic: conceptual
6
6
ms.custom: build-2023
7
-
ms.date: 10/31/2023
7
+
ms.date: 01/11/2024
8
8
ms.author: miwithro
9
9
---
10
10
@@ -82,25 +82,6 @@ Because of compliance or regulatory requirements, certain workloads may require
82
82
*[Confidential Containers][confidential-containers] (preview), also based on Kata Confidential Containers, encrypts container memory and prevents data in memory during computation from being in clear text, readable format, and tampering. It helps isolate your containers from other container groups/pods, as well as VM node OS kernel. Confidential Containers (preview) uses hardware based memory encryption (SEV-SNP).
83
83
*[Pod Sandboxing][pod-sandboxing] (preview) provides an isolation boundary between the container application and the shared kernel and compute resources (CPU, memory, and network) of the container host.
84
84
85
-
## Cluster upgrades
86
-
87
-
Azure provides upgrade orchestration tools to upgrade of an AKS cluster and components, maintain security and compliance, and access the latest features. This upgrade orchestration includes both the Kubernetes master and agent components.
88
-
89
-
To start the upgrade process, specify one of the [listed available Kubernetes versions](supported-kubernetes-versions.md). Azure then safely cordons and drains each AKS node and upgrades.
90
-
91
-
### Cordon and drain
92
-
93
-
During the upgrade process, AKS nodes are individually cordoned from the cluster to prevent new pods from being scheduled on them. The nodes are then drained and upgraded as follows:
94
-
95
-
1. A new node is deployed into the node pool.
96
-
* This node runs the latest OS image and patches.
97
-
1. One of the existing nodes is identified for upgrade.
98
-
1. Pods on the identified node are gracefully terminated and scheduled on the other nodes in the node pool.
99
-
1. The emptied node is deleted from the AKS cluster.
100
-
1. Steps 1-4 are repeated until all nodes are successfully replaced as part of the upgrade process.
101
-
102
-
For more information, see [Upgrade an AKS cluster][aks-upgrade-cluster].
103
-
104
85
## Network security
105
86
106
87
For connectivity and security with on-premises networks, you can deploy your AKS cluster into existing Azure virtual network subnets. These virtual networks connect back to your on-premises network using Azure Site-to-Site VPN or Express Route. Define Kubernetes ingress controllers with private, internal IP addresses to limit services access to the internal network connection.
0 commit comments