Skip to content

Commit fe32e43

Browse files
2 parents 1888c13 + 25550be commit fe32e43

File tree

3 files changed

+22
-4
lines changed

3 files changed

+22
-4
lines changed

articles/aks/availability-zones.md

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use availability zones in Azure Kubernetes Service (AKS)
33
description: Learn how to create a cluster that distributes nodes across availability zones in Azure Kubernetes Service (AKS)
44
ms.custom: fasttrack-edit, references_regions, devx-track-azurecli, devx-track-linux
55
ms.topic: article
6-
ms.date: 02/22/2023
6+
ms.date: 12/06/2023
77
---
88

99
# Create an Azure Kubernetes Service (AKS) cluster that uses availability zones
@@ -32,7 +32,19 @@ The following limitations apply when you create an AKS cluster using availabilit
3232
### Azure disk availability zone support
3333

3434
- Volumes that use Azure managed LRS disks aren't zone-redundant resources, attaching across zones isn't supported. You need to co-locate volumes in the same zone as the specified node hosting the target pod.
35-
- Volumes that use Azure managed ZRS disks (supported by Azure Disk CSI driver v1.5.0 and later) are zone-redundant resources. You can schedule those volumes on all zone and non-zone agent nodes.
35+
- Volumes that use Azure managed ZRS disks are zone-redundant resources. You can schedule those volumes on all zone and non-zone agent nodes, here's an example of how to create a storage class using the StandardSSD_ZRS disk:
36+
```yaml
37+
apiVersion: storage.k8s.io/v1
38+
kind: StorageClass
39+
metadata:
40+
name: managed-csi-zrs
41+
provisioner: disk.csi.azure.com
42+
parameters:
43+
skuName: StandardSSD_ZRS # or Premium_ZRS
44+
reclaimPolicy: Delete
45+
volumeBindingMode: WaitForFirstConsumer
46+
allowVolumeExpansion: true
47+
```
3648
3749
Kubernetes is aware of Azure availability zones since version 1.12. You can deploy a PersistentVolumeClaim object referencing an Azure Managed Disk in a multi-zone AKS cluster and [Kubernetes takes care of scheduling](https://kubernetes.io/docs/setup/best-practices/multiple-zones/#storage-access-for-zones) any pod that claims this PVC in the correct availability zone.
3850

articles/aks/csi-secrets-store-driver.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use the Azure Key Vault provider for Secrets Store CSI
44
author: nickomang
55
ms.author: nickoman
66
ms.topic: how-to
7-
ms.date: 10/19/2023
7+
ms.date: 12/06/2023
88
ms.custom: template-how-to, devx-track-azurecli, devx-track-linux
99
---
1010

@@ -68,6 +68,9 @@ A container using *subPath volume mount* doesn't receive secret updates when it'
6868
}
6969
```
7070
71+
> [!NOTE]
72+
> After you enable this feature, AKS creates a managed `identity named azurekeyvaultsecretsprovider-xxx` in the node resource group and assigns it to the Virtual Machine Scale Sets (VMSS) automatically. You can use this managed identity or your own managed identity to access the key vault. It's not supported to prevent creation of the identity.
73+
7174
## Upgrade an existing AKS cluster with Azure Key Vault provider for Secrets Store CSI Driver support
7275
7376
* Upgrade an existing AKS cluster with Azure Key Vault provider for Secrets Store CSI Driver capability using the [`az aks enable-addons`][az-aks-enable-addons] command and enable the `azure-keyvault-secrets-provider` add-on. The add-on creates a user-assigned managed identity you can use to authenticate to your key vault.
@@ -76,6 +79,9 @@ A container using *subPath volume mount* doesn't receive secret updates when it'
7679
az aks enable-addons --addons azure-keyvault-secrets-provider --name myAKSCluster --resource-group myResourceGroup
7780
```
7881
82+
> [!NOTE]
83+
> After you enable this feature, AKS creates a managed `identity named azurekeyvaultsecretsprovider-xxx` in the node resource group and assigns it to the Virtual Machine Scale Sets (VMSS) automatically. You can use this managed identity or your own managed identity to access the key vault. It's not supported to prevent creation of the identity.
84+
7985
## Verify the Azure Key Vault provider for Secrets Store CSI Driver installation
8086
8187
1. Verify the installation is finished using the `kubectl get pods` command, which lists all pods with the `secrets-store-csi-driver` and `secrets-store-provider-azure` labels in the kube-system namespace.

articles/machine-learning/includes/machine-learning-cli-subscription.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,6 @@ ms.author: larryfr
77
---
88

99
> [!TIP]
10-
> After logging in, you see a list of subscriptions associated with your Azure account. The subscription information with `isDefault: true` is the currently activated subscription for Azure CLI commands. This subscription must be the same one that contains your Azure Machine Learning workspace. You can find the subscription ID from the [Azure portal](https://portal.azure.com) by visiting the overview page for your workspace. You can also use the SDK to get the subscription ID from the workspace object. For example, `Workspace.from_config().subscription_id`.
10+
> After logging in, you see a list of subscriptions associated with your Azure account. The subscription information with `isDefault: true` is the currently activated subscription for Azure CLI commands. This subscription must be the same one that contains your Azure Machine Learning workspace. You can find the subscription ID from the [Azure portal](https://portal.azure.com) by visiting the overview page for your workspace..
1111
>
1212
> To select another subscription, use the `az account set -s <subscription name or ID>` command and specify the subscription name or ID to switch to. For more information about subscription selection, see [Use multiple Azure Subscriptions](/cli/azure/manage-azure-subscriptions-azure-cli).

0 commit comments

Comments
 (0)