Skip to content

Commit 3a8f280

Browse files
committed
More files updated
1 parent 1024969 commit 3a8f280

21 files changed

+112
-114
lines changed

AKS-Arc/ad-sso.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,10 +3,10 @@ title: Use Active Directory single sign-on for secure connection to Kubernetes A
33
description: Use Active Directory Authentication to securely connect to the API server with SSO credentials
44
author: sethmanheim
55
ms.topic: how-to
6-
ms.date: 08/07/2024
6+
ms.date: 04/02/2025
77
ms.author: sethm
88
ms.lastreviewed: 1/14/2022
9-
ms.reviewer: sulahiri
9+
ms.reviewer: leslielin
1010

1111
# Intent: As an IT Pro, I want to ue Active Directory Authentication to securely connect to the Kubernetes API server with SSO credentials.
1212
# Keyword: secure connection to Kubernetes API server
@@ -21,11 +21,11 @@ You can create a secure connection to your Kubernetes API server in AKS enabled
2121

2222
## Overview of AD in AKS enabled by Arc
2323

24-
Without Active Directory authentication, you must rely on a certificate-based _kubeconfig_ file when you connect to the API server via the `kubectl` command. The **kubeconfig** file contains secrets such as private keys and certificates that need to be carefully distributed, which can be a significant security risk.
24+
Without Active Directory authentication, you must rely on a certificate-based *kubeconfig* file when you connect to the API server via the `kubectl` command. The **kubeconfig** file contains secrets such as private keys and certificates that need to be carefully distributed, which can be a significant security risk.
2525

26-
As an alternative to using certificate-based kubeconfig, you can use AD SSO credentials as a secure way to connect to the API server. AD integration with AKS Arc lets users on a Windows domain-joined machine connect to the API server via `kubectl` using their SSO credentials. This removes the need to manage and distribute certificate-based kubeconfig files that contain private keys.
26+
As an alternative to using certificate-based **kubeconfig**, you can use AD SSO credentials as a secure way to connect to the API server. AD integration with AKS Arc lets users on a Windows domain-joined machine connect to the API server via `kubectl` using their SSO credentials. This removes the need to manage and distribute certificate-based **kubeconfig** files that contain private keys.
2727

28-
AD integration uses AD kubeconfig, which is distinct from the certificate-based kubeconfig files and doesn't contain any secrets. However, the certificate-based kubeconfig file can be used for backup purposes, such as troubleshooting, if there are issues with connecting using Active Directory credentials.
28+
AD integration uses AD **kubeconfig**, which is distinct from the certificate-based **kubeconfig** files and doesn't contain any secrets. However, the certificate-based **kubeconfig** file can be used for backup purposes, such as troubleshooting, if there are issues with connecting using Active Directory credentials.
2929

3030
Another security benefit with AD integration is that the users and groups are stored as [security identifiers (SIDs)](/troubleshoot/windows-server/identity/security-identifiers-in-windows). Unlike group names, SIDs are immutable and unique and therefore present no naming conflicts.
3131

@@ -77,7 +77,7 @@ Before you can install AD authentication, the workload cluster must be installed
7777

7878
#### Option 1
7979

80-
For a domain-joined Azure Local or Windows Server cluster, open PowerShell as an administrator and run the following command:
80+
For a domain-joined Windows Server cluster, open PowerShell as an administrator and run the following command:
8181

8282
```powershell
8383
Install-AksHciAdAuth -name mynewcluster1 -keytab .\current.keytab -SPN k8s/[email protected] -adminUser contoso\bob

AKS-Arc/azure-rbac-aks-hybrid.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ ms.topic: how-to
55
ms.custom: devx-track-azurecli
66
author: sethmanheim
77
ms.author: sethm
8-
ms.date: 06/28/2024
9-
ms.reviewer: sulahiri
8+
ms.date: 04/02/2025
9+
ms.reviewer: leslielin
1010
ms.lastreviewed: 06/28/2024
1111

1212
# Intent: As an IT Pro, I want to use Azure RBAC to authenticate connections to my AKS clusters over the Internet or on a private network.
@@ -33,7 +33,7 @@ Before you deploy a Kubernetes cluster with Azure Arc enabled, you must complete
3333

3434
### Install the Azure CLI extension
3535

36-
The preview version of the Azure Arc-enabled Kubernetes Azure CLI extension is the only compatible version for this preview setup of AKS on Azure Local 22H2. Using a higher version can cause incompatibility issues with Azure RBAC and AKS Arc. To install the extension, run the following command:
36+
The preview version of the Azure Arc-enabled Kubernetes Azure CLI extension is the only compatible version for this preview setup of AKS on Windows Server. Using a higher version can cause incompatibility issues with Azure RBAC and AKS Arc. To install the extension, run the following command:
3737

3838
```azurecli
3939
az extension add -n connectedk8s --version 1.5.4
@@ -146,7 +146,7 @@ To create an AKS target cluster with Azure RBAC enabled using an SPN:
146146

147147
1. If you don't already have an SPN to use with the target cluster, [create the SPN](/cli/azure/azure-cli-sp-tutorial-1) now.
148148
1. Note that the new SPN is for one time use when creating the cluster and doesn't require managing passwords.
149-
1. Open a PowerShell window on the Azure Local node or Windows server where you deploy the cluster, and run the following command:
149+
1. Open a PowerShell window on the AKS node or Windows Server where you deploy the cluster, and run the following command:
150150

151151
```powershell
152152
New-AksHciCluster -name "<cluster name>" -enableAzureRBAC -resourceGroup "<resource group name>" -subscriptionID "<subscription ID>" -tenantId "<tenant ID>" -credential $Credential -location "eastus" -appId $SERVER_APP_ID -appSecret $SERVER_APP_SECRET -aadClientId $CLIENT_APP_ID -nodePoolName <name of node pool>
@@ -156,7 +156,7 @@ To create an AKS target cluster with Azure RBAC enabled using an SPN:
156156

157157
If you prefer to create your Azure RBAC-enabled target cluster interactively, follow these steps:
158158

159-
1. Open a PowerShell window on the Azure Local node or Windows server where you deploy the cluster.
159+
1. Open a PowerShell window on the AKS node or Windows server where you deploy the cluster.
160160
1. Sign in to Azure by running the following `connect-azaccount -deviceauth` command:
161161

162162
```powershell
@@ -215,7 +215,7 @@ To connect to an AKS cluster using the `connectedk8s` proxy method, perform the
215215

216216
When you connect to an AKS cluster over a private network, there's no limit the on number of groups you can use.
217217

218-
To retrieve the Microsoft Entra kubeconfig log into and on-premises machine (for example, an Azure Local cluster), generate the Microsoft Entra kubeconfig using the following command. You can distribute the Microsoft Entra kubeconfig to users that connect from their client machine. The Microsoft Entra kubeconfig doesn't contain any secrets.
218+
To retrieve the Microsoft Entra kubeconfig log into and on-premises machine (for example, a Windows Server cluster), generate the Microsoft Entra kubeconfig using the following command. You can distribute the Microsoft Entra kubeconfig to users that connect from their client machine. The Microsoft Entra kubeconfig doesn't contain any secrets.
219219

220220
To connect to an AKS cluster over a private network, perform the following steps:
221221

@@ -246,7 +246,7 @@ This command also downloads the **kubelogin.exe** binary. To find the location o
246246
$workingdir = (Get-AksHciConfig).Akshci.installationPackageDir
247247
```
248248

249-
This command returns the path to where **kubelogin.exe** is downloaded. Copy the **kubelogin.exe** file to your Azure Local node or client machine. For Azure Local, copy the file to the path as described in the following example. For a client machine, copy the executable to your client machine and add it to your path. For example:
249+
This command returns the path to where **kubelogin.exe** is downloaded. Copy the **kubelogin.exe** file to your Windows Server node or client machine. For Windows Server, copy the file to the path as described in the following example. For a client machine, copy the executable to your client machine and add it to your path. For example:
250250

251251
```powershell
252252
cp $workingdir\kubelogin.exe "c:\program files\akshci"
Lines changed: 18 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
2-
title: Create and use a custom load balancer with Azure Kubernetes Service on Azure Local
3-
description: Learn how to create and use a custom load balancer with Azure Kubernetes Service on Azure Local.
2+
title: Create and use a custom load balancer with Azure Kubernetes Service on Windows Server
3+
description: Learn how to create and use a custom load balancer with Azure Kubernetes Service on Windows Server.
44
author: sethmanheim
55
ms.topic: how-to
6-
ms.date: 04/27/2022
6+
ms.date: 04/02/2025
77
ms.author: sethm
88
ms.lastreviewed: 1/14/2022
99
ms.reviewer: rbaziwane
@@ -13,51 +13,47 @@ ms.reviewer: rbaziwane
1313

1414
---
1515

16-
# Create and use a custom load balancer in Azure Kubernetes Service on Azure Local and Windows Server
16+
# Create and use a custom load balancer in Azure Kubernetes Service on Windows Server
1717

1818
[!INCLUDE [aks-hybrid-applies-to-azure-stack-hci-windows-server-sku](includes/aks-hci-applies-to-skus/aks-hybrid-applies-to-azure-stack-hci-windows-server-sku.md)]
1919

20-
This article covers how to create and use a custom load balancer. In Azure Kubernetes Service (AKS) on Azure Local and Windows Server, you use load balancers to send requests to the Kubernetes API server and to manage traffic to application services. When using a custom load balancer, [kube-vip](https://kube-vip.io/) automatically deploys to manage the load balancing of requests to the Kubernetes API server and to make sure that it's highly available.
20+
This article describes how to create and use a custom load balancer. In Azure Kubernetes Service (AKS) on Windows Server, you can use load balancers to send requests to the Kubernetes API server and to manage traffic to application services. When you use a custom load balancer, [kube-vip](https://kube-vip.io/) automatically deploys to manage the load balancing of requests to the Kubernetes API server and to make sure that it's highly available.
2121

2222
> [!NOTE]
2323
> You can also use a other load balancers, such as MetalLB or Software Defined Networking (SDN) load balancing, to load balance traffic to application services.
2424
25-
## Before you begin
25+
## Before you begin
2626

27-
You must have installed [AKS on Azure Local and Windows Server](kubernetes-walkthrough-powershell.md) and provided a range of virtual IP addresses for the load balancer during the network configuration step during installation.
27+
You must install [AKS on Windows Server](kubernetes-walkthrough-powershell.md) and provide a range of virtual IP addresses for the load balancer during the network configuration step during installation.
2828

29-
## Configure a custom load balancer
29+
## Configure a custom load balancer
3030

3131
> [!WARNING]
32-
> If you choose to deploy your own load balancer, the Kubernetes cluster will be unreachable after installation. If you deploy any services with `type=LoadBalancer`, the services will also be unreachable until you configure your load balancer.
32+
> If you choose to deploy your own load balancer, the Kubernetes cluster becomes unreachable after installation. If you deploy any services with `type=LoadBalancer`, the services are also unreachable until you configure your load balancer.
3333
34-
This configuration assumes you want to leverage a custom load balancer in your cluster. In this case, the workload cluster is deployed without a load balancer.
34+
This configuration assumes you want to use a custom load balancer in your cluster. In this case, the workload cluster is deployed without a load balancer:
3535

3636
1. Create a load balancer configuration using the [New-AksHciLoadBalancerSetting](./reference/ps/new-akshciloadbalancersetting.md) cmdlet and then select `none` for the `loadBalancerSku` parameter:
3737

3838
```powershell
3939
$lbCfg=New-AksHciLoadBalancerSetting -name "myLb" -loadBalancerSku "none"
4040
```
41-
42-
2. Deploy a workload cluster without providing the load balancer configuration using the following command:
41+
42+
1. Deploy a workload cluster without providing the load balancer configuration using the following command:
4343

4444
```powershell
4545
New-AksHciCluster -name "summertime" -nodePoolName mynodepool -nodeCount 2 -OSType linux -nodeVmSize Standard_A4_v2 -loadBalancerSettings $lbCfg
4646
```
4747

48-
3. Use [Get-AksHciCluster](./reference/ps/get-akshcicluster.md) to verify that the cluster is successfully deployed with the control plane nodes running `kube-vip` and that the API server requests are reachable.
48+
1. Use [Get-AksHciCluster](./reference/ps/get-akshcicluster.md) to verify that the cluster is successfully deployed with the control plane nodes running `kube-vip` and that the API server requests are reachable.
4949

50-
4. Manually configure your load balancer.
50+
1. Manually configure your load balancer.
5151

52-
If you run an upgrade, the load balancer configuration (`loadBalancerSku` and `count`) you defined during installation will remain the same after the upgrade completes. However, if you want to update `loadBalancerSku` during an upgrade, you must redeploy your workload clusters. If you have existing clusters running a HAProxy-based load balancer, you can continue running your workloads and the upgrade will successfully complete.
52+
If you run an upgrade, the load balancer configuration (`loadBalancerSku` and `count`) you defined during installation remains the same after the upgrade completes. However, if you want to update `loadBalancerSku` during an upgrade, you must redeploy your workload clusters. If you have existing clusters running a HAProxy-based load balancer, you can continue running your workloads and the upgrade completes successfully.
5353

5454
> [!IMPORTANT]
55-
> If you change from using a custom load balancer to using the default load balancer, you're required to redeploy your workload cluster with the new load balancer configuration. For instructions on how to configure the default load balancer, see [Configure load balancer](configure-load-balancer.md).
56-
57-
## Next steps
58-
59-
To learn more about Kubernetes services, see the [Kubernetes services documentation](https://kubernetes.io/docs/concepts/services-networking/service/).
55+
> If you change from using a custom load balancer to using the default load balancer, you're required to redeploy your workload cluster with the new load balancer configuration. For information about how to configure the default load balancer, see [Configure load balancer](configure-load-balancer.md).
6056
61-
57+
## Next steps
6258

63-
59+
To learn more about Kubernetes services, see the [Kubernetes services documentation](https://kubernetes.io/docs/concepts/services-networking/service/).

AKS-Arc/connect-to-arc.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@ author: sethmanheim
55
ms.topic: how-to
66
ms.custom:
77
- devx-track-azurepowershell
8-
ms.date: 07/02/2024
8+
ms.date: 04/02/2025
99
ms.author: sethm
1010
ms.lastreviewed: 1/14/2022
1111
ms.reviewer: abha
1212

1313
# Intent: As an IT Pro, I want to learn how to connect an Azure Kubernetes Service cluster to Kubernetes so I can extend those capabilities to my Kubernetes clusters.
14-
# Keyword: AKS cluster Azure Local cluster
14+
# Keyword: AKS cluster Kubernetes cluster
1515
---
1616

1717
# Connect an Azure Kubernetes Service cluster to Azure Arc

AKS-Arc/deploy-arc-data-services.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,10 +3,11 @@ title: Deploy Azure Arc-enabled data services in AKS enabled by Azure Arc
33
description: Learn how to deploy Azure Arc-enabled data services in AKS enabled by Azure Arc.
44
author: sethmanheim
55
ms.topic: how-to
6-
ms.date: 07/03/2024
6+
ms.date: 04/02/2025
77
ms.author: sethm
88
ms.lastreviewed: 1/14/2022
99
ms.reviewer: rbaziwane
10+
1011
# Intent: As an IT Pro, I need to learn the requirements needed in order to deploy Azure Arc data.
1112
# Keyword: Azure Arc data services
1213
---
@@ -17,7 +18,7 @@ ms.reviewer: rbaziwane
1718

1819
This article provides a checklist of prerequisites you can follow to deploy Azure Arc-enabled data services on Azure Kubernetes Service (AKS) enabled by Azure Arc. You must have [AKS](kubernetes-walkthrough-powershell.md) installed before using the checklist.
1920

20-
## Prerequisites for AKS on Azure Local and Windows Server
21+
## Prerequisites for AKS on Windows Server
2122

2223
> [!div class="checklist"]
2324
> * [Provision a workload cluster with only Linux node pools](use-node-pools.md).
@@ -28,13 +29,13 @@ This article provides a checklist of prerequisites you can follow to deploy Azur
2829
> [!div class="checklist"]
2930
> * [Connect your clusters to Azure Arc for Kubernetes](connect-to-arc.md).
3031
31-
Confirm whether custom location is enabled on your Kubernetes cluster by running the following command and checking for `customLocation: enabled: true`:
32+
Confirm whether the custom location is enabled on your Kubernetes cluster by running the following command and checking for `customLocation: enabled: true`:
3233

3334
```console
3435
helm get values azure-arc
3536
```
3637

37-
If custom location isn't enabled, run the following CLI command:
38+
If the custom location isn't enabled, run the following CLI command:
3839

3940
```azurecli
4041
az connectedk8s enable-features -n <clusterName> -g <resourceGroupName> --features cluster-connect custom-locations

AKS-Arc/deploy-gpu-node-pool-22h2.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Use GPUs for compute-intensive workloads
3-
description: Learn how to deploy GPU-enabled node pools in AKS enabled by Arc on Azure Local 22H2.
3+
description: Learn how to deploy GPU-enabled node pools in AKS enabled by Azure Arc on Windows Server.
44
author: sethmanheim
55
ms.topic: how-to
6-
ms.date: 02/29/2024
6+
ms.date: 04/02/2025
77
ms.author: sethm
88
ms.lastreviewed: 03/21/2023
9-
ms.reviewer: sethm
9+
1010
# Intent: As an IT Pro, I want to learn how to deploy GPU-enabled node pools
1111
# Keyword: Run GPU workloads on Kubernetes
1212
---
@@ -97,7 +97,7 @@ OK Nvidia T4_base - Dismounted PCI\VEN_10DE&DEV_1EB8&SUBSYS_
9797
Repeat steps 1 to 3 for each node in your failover cluster.
9898

9999
> [!IMPORTANT]
100-
> GPU-enabled virtual machines are not added to failover clustering in Windows Server 2019, Windows Server 2022, or Azure Local.
100+
> GPU-enabled virtual machines are not added to failover clustering in Windows Server 2019 and Windows Server 2022.
101101
102102
## Install or update AKS
103103

@@ -232,4 +232,4 @@ If an upgrade is triggered on a cluster without extra GPU resources to facilitat
232232

233233
## Next steps
234234

235-
- [AKS on Azure Local and Windows Server overview](overview.md)
235+
- [AKS on Windows Server overview](overview.md)

AKS-Arc/deploy-target-clusters-virtual-networks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ New-AksHciClusterNetwork -name "SDNVNet1" -vswitchName "ConvergedSwitch(hci)" `
4545
| `ipAddressPrefix` | Subnet prefix for creating the virtual network in the network controller. This prefix is a subnet prefix, not a virtual network prefix. Currently, MOC only supports a single subnet. |
4646
| `gateway` | Default gateway for the subnet. Must be the first IP of the subnet. SDN doesn't support custom default gateways for virtual networks. |
4747
| `dnsServers` | DNS servers reachable from SDN VMs public IP or other (for example, an L3 connection), used for name resolutions. |
48-
| `K8sNodeIpPoolStart`, `K8sNodeIpPoolEnd` | A subset or full IP range from the `ipAddressPrefix`. Used by MOC IPAM to allocate IP addresses for nodes. Useful if deploying non-AKS on Azure Local VMs on the same subnet, but not recommended due to possible misconfiguration. |
48+
| `K8sNodeIpPoolStart`, `K8sNodeIpPoolEnd` | A subset or full IP range from the `ipAddressPrefix`. Used by MOC IPAM to allocate IP addresses for nodes. Useful if deploying non-AKS on Windows Server VMs on the same subnet, but not recommended due to possible misconfiguration. |
4949

5050
## Create a Kubernetes cluster on your SDN virtual network
5151

AKS-Arc/encrypt-secrets.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.author: sethm
88
ms.lastreviewed: 1/14/2022
99
ms.reviewer: aathipsa
1010
# Intent: As an IT Pro, I want to learn about encrypted etcd secrets and how they are used in my AKS deployment.
11-
# Keyword: etcd secrets AKS Azure Local
11+
# Keyword: etcd secrets AKS Windows Server
1212

1313
---
1414

0 commit comments

Comments
 (0)