Skip to content

Commit ff5007a

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into sigwhatsnew
2 parents c47b1f0 + d19682e commit ff5007a

File tree

8 files changed

+73
-49
lines changed

8 files changed

+73
-49
lines changed

articles/aks/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
href: intro-kubernetes.md
77
- name: Quotas and regional limits
88
href: quotas-skus-regions.md
9-
- name: Supported Kubernetes version
9+
- name: Supported Kubernetes versions
1010
href: supported-kubernetes-versions.md
1111
- name: Add-ons, extensions, and other integrations
1212
href: integrations.md

articles/aks/azure-ad-rbac.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -184,6 +184,8 @@ kubectl create namespace dev
184184

185185
> [!NOTE]
186186
> In Kubernetes, *Roles* define the permissions to grant, and *RoleBindings* apply them to desired users or groups. These assignments can be applied to a given namespace, or across the entire cluster. For more information, see [Using Kubernetes RBAC authorization][rbac-authorization].
187+
>
188+
> If the user you grant the Kubernetes RBAC binding for is in the same Azure AD tenant, assign permissions based on the *userPrincipalName (UPN)*. If the user is in a different Azure AD tenant, query for and use the *objectId* property instead.
187189
188190
3. Create a Role for the *dev* namespace, which grants full permissions to the namespace. In production environments, you can specify more granular permissions for different users or groups. Create a file named `role-dev-namespace.yaml` and paste the following YAML manifest:
189191

articles/aks/concepts-security.md

Lines changed: 3 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -15,31 +15,18 @@ Container security protects the entire end-to-end pipeline from build to the app
1515
The Secure Supply Chain includes the build environment and registry.
1616

1717
Kubernetes includes security components, such as *pod security standards* and *Secrets*. Meanwhile, Azure includes components like Active Directory, Microsoft Defender for Containers, Azure Policy, Azure Key Vault, network security groups and orchestrated cluster upgrades. AKS combines these security components to:
18+
1819
* Provide a complete Authentication and Authorization story.
1920
* Leverage AKS Built-in Azure Policy to secure your applications.
2021
* End-to-End insight from build through your application with Microsoft Defender for Containers.
2122
* Keep your AKS cluster running the latest OS security updates and Kubernetes releases.
2223
* Provide secure pod traffic and access to sensitive credentials.
2324

24-
This article introduces the core concepts that secure your applications in AKS:
25-
26-
- [Security concepts for applications and clusters in Azure Kubernetes Service (AKS)](#security-concepts-for-applications-and-clusters-in-azure-kubernetes-service-aks)
27-
- [Build security](#build-security)
28-
- [Registry security](#registry-security)
29-
- [Cluster security](#cluster-security)
30-
- [Node security](#node-security)
31-
- [Compute isolation](#compute-isolation)
32-
- [Cluster upgrades](#cluster-upgrades)
33-
- [Cordon and drain](#cordon-and-drain)
34-
- [Network security](#network-security)
35-
- [Azure network security groups](#azure-network-security-groups)
36-
- [Application Security](#application-security)
37-
- [Kubernetes Secrets](#kubernetes-secrets)
38-
- [Next steps](#next-steps)
25+
This article introduces the core concepts that secure your applications in AKS.
3926

4027
## Build Security
4128

42-
As the entry point for the Supply Chain, it is important to conduct static analysis of image builds before they are promoted down the pipeline. This includes vulnerability and compliance assessment. It is not about failing a build because it has a vulnerability, as that will break development. It is about looking at the "Vendor Status" to segment based on vulnerabilities that are actionable by the development teams. Also leverage "Grace Periods" to allow developers time to remediate identified issues.
29+
As the entry point for the Supply Chain, it is important to conduct static analysis of image builds before they are promoted down the pipeline. This includes vulnerability and compliance assessment. It is not about failing a build because it has a vulnerability, as that will break development. It is about looking at the "Vendor Status" to segment based on vulnerabilities that are actionable by the development teams. Also leverage "Grace Periods" to allow developers time to remediate identified issues.
4330

4431
## Registry Security
4532

articles/azure-arc/data/release-notes.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,22 @@ ms.custom: references_regions, devx-track-azurecli, event-tier1-build-2022
1717

1818
This article highlights capabilities, features, and enhancements recently released or improved for Azure Arc-enabled data services.
1919

20+
## January 13, 2023
21+
22+
### Image tag
23+
24+
`v1.15.0_2023-01-10`
25+
26+
For complete release version information, see [Version log](version-log.md#january-13-2023).
27+
28+
New for this release:
29+
30+
- Arc data services:
31+
- Kafka separate mode - Description of this change and all customer and developer impacts are enumerated in the linked feature.
32+
33+
- Arc-SQL MI
34+
- Time series functions are available.
35+
2036
## December 13, 2022
2137

2238
### Image tag

articles/azure-arc/data/version-log.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,17 @@ ms.topic: conceptual
1717

1818
This article identifies the component versions with each release of Azure Arc-enabled data services.
1919

20+
## January 13, 2023
21+
22+
|Component|Value|
23+
|-----------|-----------|
24+
|Container images tag |`v1.15.0_2023-01-10`|
25+
|CRD names and version|`datacontrollers.arcdata.microsoft.com`: v1beta1, v1 through v6<br/>`exporttasks.tasks.arcdata.microsoft.com`: v1beta1, v1, v2<br/>`kafkas.arcdata.microsoft.com`: v1beta1, v1beta2<br/>`monitors.arcdata.microsoft.com`: v1beta1, v1, v2<br/>`sqlmanagedinstances.sql.arcdata.microsoft.com`: v1beta1, v1 through v7<br/>`postgresqls.arcdata.microsoft.com`: v1beta1, v1beta2, v1beta3<br/>`sqlmanagedinstancerestoretasks.tasks.sql.arcdata.microsoft.com`: v1beta1, v1<br/>`failovergroups.sql.arcdata.microsoft.com`: v1beta1, v1beta2, v1 through v2<br/>`activedirectoryconnectors.arcdata.microsoft.com`: v1beta1, v1beta2, v1<br/>`sqlmanagedinstancereprovisionreplicatask.tasks.sql.arcdata.microsoft.com`: v1beta1<br/>`telemetrycollectors.arcdata.microsoft.com`: v1beta1, v1beta2, v1beta3 *use to be otelcollectors*<br/>`telemetryrouters.arcdata.microsoft.com`: v1beta1, v1beta2, v1beta3, v1beta4<br/>`sqlmanagedinstancemonitoringprofiles.arcdata.microsoft.com`: v1beta1, v1beta2<br/>|
26+
|Azure Resource Manager (ARM) API version|2022-06-15-preview|
27+
|`arcdata` Azure CLI extension version|1.4.9 ([Download](https://aka.ms/az-cli-arcdata-ext))|
28+
|Arc-enabled Kubernetes helm chart extension version|1.14.0|
29+
|Azure Arc Extension for Azure Data Studio<br/>`arc`<br/>`azcli`|*No Changes*<br/>1.7.0 ([Download](https://aka.ms/ads-arcdata-ext))</br>1.7.0 ([Download](https://aka.ms/ads-azcli-ext))|
30+
2031
## December 13, 2022
2132

2233
|Component|Value|

articles/azure-vmware/concepts-private-clouds-clusters.md

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Concepts - Private clouds and clusters
33
description: Learn about the key capabilities of Azure VMware Solution software-defined data centers and VMware vSphere clusters.
44
ms.topic: conceptual
55
ms.service: azure-vmware
6-
ms.date: 10/25/2022
6+
ms.date: 1/10/2023
77
ms.custom: engagement-fy23
88
---
99

@@ -46,9 +46,14 @@ The diagram shows a single Azure subscription with two private clouds that repre
4646

4747
## Host monitoring and remediation
4848

49-
Azure VMware Solution continuously monitors the health of both the underlay and the VMware components. When Azure VMware Solution detects a failure, it takes action to repair the failed components. When Azure VMware Solution detects a degradation or failure on an Azure VMware Solution node, it triggers the host remediation process.
49+
Azure VMware Solution continuously monitors the health of both the VMware components and underlay. When Azure VMware Solution detects a failure, it takes action to repair the failed components. When Azure VMware Solution detects a degradation or failure on an Azure VMware Solution node, it triggers the host remediation process.
5050

51-
Host remediation involves replacing the faulty node with a new healthy node in the cluster. Then, when possible, the faulty host is placed in VMware vSphere maintenance mode. VMware vMotion moves the VMs off the faulty host to other available servers in the cluster, potentially allowing zero downtime for live migration of workloads. If the faulty host can't be placed in maintenance mode, the host is removed from the cluster.
51+
Host remediation involves replacing the faulty node with a new healthy node in the cluster. Then, when possible, the faulty host is placed in VMware vSphere maintenance mode. VMware vMotion moves the VMs off the faulty host to other available servers in the cluster, potentially allowing zero downtime for live migration of workloads. If the faulty host can't be placed in maintenance mode, the host is removed from the cluster. Before the faulty host is removed, the customer workloads will be migrated to a newly added host.
52+
53+
> [!TIP]
54+
> **Customer communication:** An email is sent to the customer's email address before the replacement is initiated and again after the replacement is successful.
55+
>
56+
> To receive emails related to host replacement, you need to be added to any of the following Azure RBAC roles in the subscription: 'ServiceAdmin', 'CoAdmin', 'Owner', 'Contributor'.
5257
5358
Azure VMware Solution monitors the following conditions on the host:
5459

@@ -66,7 +71,7 @@ Azure VMware Solution monitors the following conditions on the host:
6671
- Connection failure
6772

6873
> [!NOTE]
69-
> Azure VMware Solution tenant admins must not edit or delete the above defined VMware vCenter Server alarms, as these are managed by the Azure VMware Solution control plane on vCenter Server. These alarms are used by Azure VMware Solution monitoring to trigger the Azure VMware Solution host remediation process.
74+
> Azure VMware Solution tenant admins must not edit or delete the previously defined VMware vCenter Server alarms because they are managed by the Azure VMware Solution control plane on vCenter Server. These alarms are used by Azure VMware Solution monitoring to trigger the Azure VMware Solution host remediation process.
7075
7176
## Backup and restoration
7277

0 commit comments

Comments
 (0)