You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: AKS-Arc/ad-sso.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,10 +3,10 @@ title: Use Active Directory single sign-on for secure connection to Kubernetes A
3
3
description: Use Active Directory Authentication to securely connect to the API server with SSO credentials
4
4
author: sethmanheim
5
5
ms.topic: how-to
6
-
ms.date: 08/07/2024
6
+
ms.date: 04/02/2025
7
7
ms.author: sethm
8
8
ms.lastreviewed: 1/14/2022
9
-
ms.reviewer: sulahiri
9
+
ms.reviewer: leslielin
10
10
11
11
# Intent: As an IT Pro, I want to ue Active Directory Authentication to securely connect to the Kubernetes API server with SSO credentials.
12
12
# Keyword: secure connection to Kubernetes API server
@@ -21,11 +21,11 @@ You can create a secure connection to your Kubernetes API server in AKS enabled
21
21
22
22
## Overview of AD in AKS enabled by Arc
23
23
24
-
Without Active Directory authentication, you must rely on a certificate-based _kubeconfig_ file when you connect to the API server via the `kubectl` command. The **kubeconfig** file contains secrets such as private keys and certificates that need to be carefully distributed, which can be a significant security risk.
24
+
Without Active Directory authentication, you must rely on a certificate-based *kubeconfig* file when you connect to the API server via the `kubectl` command. The **kubeconfig** file contains secrets such as private keys and certificates that need to be carefully distributed, which can be a significant security risk.
25
25
26
-
As an alternative to using certificate-based kubeconfig, you can use AD SSO credentials as a secure way to connect to the API server. AD integration with AKS Arc lets users on a Windows domain-joined machine connect to the API server via `kubectl` using their SSO credentials. This removes the need to manage and distribute certificate-based kubeconfig files that contain private keys.
26
+
As an alternative to using certificate-based **kubeconfig**, you can use AD SSO credentials as a secure way to connect to the API server. AD integration with AKS Arc lets users on a Windows domain-joined machine connect to the API server via `kubectl` using their SSO credentials. This removes the need to manage and distribute certificate-based **kubeconfig** files that contain private keys.
27
27
28
-
AD integration uses AD kubeconfig, which is distinct from the certificate-based kubeconfig files and doesn't contain any secrets. However, the certificate-based kubeconfig file can be used for backup purposes, such as troubleshooting, if there are issues with connecting using Active Directory credentials.
28
+
AD integration uses AD **kubeconfig**, which is distinct from the certificate-based **kubeconfig** files and doesn't contain any secrets. However, the certificate-based **kubeconfig** file can be used for backup purposes, such as troubleshooting, if there are issues with connecting using Active Directory credentials.
29
29
30
30
Another security benefit with AD integration is that the users and groups are stored as [security identifiers (SIDs)](/troubleshoot/windows-server/identity/security-identifiers-in-windows). Unlike group names, SIDs are immutable and unique and therefore present no naming conflicts.
31
31
@@ -77,7 +77,7 @@ Before you can install AD authentication, the workload cluster must be installed
77
77
78
78
#### Option 1
79
79
80
-
For a domain-joined Azure Local or Windows Server cluster, open PowerShell as an administrator and run the following command:
80
+
For a domain-joined Windows Server cluster, open PowerShell as an administrator and run the following command:
Copy file name to clipboardExpand all lines: AKS-Arc/azure-rbac-aks-hybrid.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,8 +5,8 @@ ms.topic: how-to
5
5
ms.custom: devx-track-azurecli
6
6
author: sethmanheim
7
7
ms.author: sethm
8
-
ms.date: 06/28/2024
9
-
ms.reviewer: sulahiri
8
+
ms.date: 04/02/2025
9
+
ms.reviewer: leslielin
10
10
ms.lastreviewed: 06/28/2024
11
11
12
12
# Intent: As an IT Pro, I want to use Azure RBAC to authenticate connections to my AKS clusters over the Internet or on a private network.
@@ -33,7 +33,7 @@ Before you deploy a Kubernetes cluster with Azure Arc enabled, you must complete
33
33
34
34
### Install the Azure CLI extension
35
35
36
-
The preview version of the Azure Arc-enabled Kubernetes Azure CLI extension is the only compatible version for this preview setup of AKS on Azure Local 22H2. Using a higher version can cause incompatibility issues with Azure RBAC and AKS Arc. To install the extension, run the following command:
36
+
The preview version of the Azure Arc-enabled Kubernetes Azure CLI extension is the only compatible version for this preview setup of AKS on Windows Server. Using a higher version can cause incompatibility issues with Azure RBAC and AKS Arc. To install the extension, run the following command:
37
37
38
38
```azurecli
39
39
az extension add -n connectedk8s --version 1.5.4
@@ -146,7 +146,7 @@ To create an AKS target cluster with Azure RBAC enabled using an SPN:
146
146
147
147
1. If you don't already have an SPN to use with the target cluster, [create the SPN](/cli/azure/azure-cli-sp-tutorial-1) now.
148
148
1. Note that the new SPN is for one time use when creating the cluster and doesn't require managing passwords.
149
-
1. Open a PowerShell window on the Azure Local node or Windows server where you deploy the cluster, and run the following command:
149
+
1. Open a PowerShell window on the AKS node or Windows Server where you deploy the cluster, and run the following command:
@@ -156,7 +156,7 @@ To create an AKS target cluster with Azure RBAC enabled using an SPN:
156
156
157
157
If you prefer to create your Azure RBAC-enabled target cluster interactively, follow these steps:
158
158
159
-
1. Open a PowerShell window on the Azure Local node or Windows server where you deploy the cluster.
159
+
1. Open a PowerShell window on the AKS node or Windows server where you deploy the cluster.
160
160
1. Sign in to Azure by running the following `connect-azaccount -deviceauth` command:
161
161
162
162
```powershell
@@ -215,7 +215,7 @@ To connect to an AKS cluster using the `connectedk8s` proxy method, perform the
215
215
216
216
When you connect to an AKS cluster over a private network, there's no limit the on number of groups you can use.
217
217
218
-
To retrieve the Microsoft Entra kubeconfig log into and on-premises machine (for example, an Azure Local cluster), generate the Microsoft Entra kubeconfig using the following command. You can distribute the Microsoft Entra kubeconfig to users that connect from their client machine. The Microsoft Entra kubeconfig doesn't contain any secrets.
218
+
To retrieve the Microsoft Entra kubeconfig log into and on-premises machine (for example, a Windows Server cluster), generate the Microsoft Entra kubeconfig using the following command. You can distribute the Microsoft Entra kubeconfig to users that connect from their client machine. The Microsoft Entra kubeconfig doesn't contain any secrets.
219
219
220
220
To connect to an AKS cluster over a private network, perform the following steps:
221
221
@@ -246,7 +246,7 @@ This command also downloads the **kubelogin.exe** binary. To find the location o
This command returns the path to where **kubelogin.exe** is downloaded. Copy the **kubelogin.exe** file to your Azure Local node or client machine. For Azure Local, copy the file to the path as described in the following example. For a client machine, copy the executable to your client machine and add it to your path. For example:
249
+
This command returns the path to where **kubelogin.exe** is downloaded. Copy the **kubelogin.exe** file to your Windows Server node or client machine. For Windows Server, copy the file to the path as described in the following example. For a client machine, copy the executable to your client machine and add it to your path. For example:
This article covers how to create and use a custom load balancer. In Azure Kubernetes Service (AKS) on Azure Local and Windows Server, you use load balancers to send requests to the Kubernetes API server and to manage traffic to application services. When using a custom load balancer, [kube-vip](https://kube-vip.io/) automatically deploys to manage the load balancing of requests to the Kubernetes API server and to make sure that it's highly available.
20
+
This article describes how to create and use a custom load balancer. In Azure Kubernetes Service (AKS) on Windows Server, you can use load balancers to send requests to the Kubernetes API server and to manage traffic to application services. When you use a custom load balancer, [kube-vip](https://kube-vip.io/) automatically deploys to manage the load balancing of requests to the Kubernetes API server and to make sure that it's highly available.
21
21
22
22
> [!NOTE]
23
23
> You can also use a other load balancers, such as MetalLB or Software Defined Networking (SDN) load balancing, to load balance traffic to application services.
24
24
25
-
## Before you begin
25
+
## Before you begin
26
26
27
-
You must have installed [AKS on Azure Local and Windows Server](kubernetes-walkthrough-powershell.md) and provided a range of virtual IP addresses for the load balancer during the network configuration step during installation.
27
+
You must install [AKS on Windows Server](kubernetes-walkthrough-powershell.md) and provide a range of virtual IP addresses for the load balancer during the network configuration step during installation.
28
28
29
-
## Configure a custom load balancer
29
+
## Configure a custom load balancer
30
30
31
31
> [!WARNING]
32
-
> If you choose to deploy your own load balancer, the Kubernetes cluster will be unreachable after installation. If you deploy any services with `type=LoadBalancer`, the services will also be unreachable until you configure your load balancer.
32
+
> If you choose to deploy your own load balancer, the Kubernetes cluster becomes unreachable after installation. If you deploy any services with `type=LoadBalancer`, the services are also unreachable until you configure your load balancer.
33
33
34
-
This configuration assumes you want to leverage a custom load balancer in your cluster. In this case, the workload cluster is deployed without a load balancer.
34
+
This configuration assumes you want to use a custom load balancer in your cluster. In this case, the workload cluster is deployed without a load balancer:
35
35
36
36
1. Create a load balancer configuration using the [New-AksHciLoadBalancerSetting](./reference/ps/new-akshciloadbalancersetting.md) cmdlet and then select `none` for the `loadBalancerSku` parameter:
3. Use [Get-AksHciCluster](./reference/ps/get-akshcicluster.md) to verify that the cluster is successfully deployed with the control plane nodes running `kube-vip` and that the API server requests are reachable.
48
+
1. Use [Get-AksHciCluster](./reference/ps/get-akshcicluster.md) to verify that the cluster is successfully deployed with the control plane nodes running `kube-vip` and that the API server requests are reachable.
49
49
50
-
4. Manually configure your load balancer.
50
+
1. Manually configure your load balancer.
51
51
52
-
If you run an upgrade, the load balancer configuration (`loadBalancerSku` and `count`) you defined during installation will remain the same after the upgrade completes. However, if you want to update `loadBalancerSku` during an upgrade, you must redeploy your workload clusters. If you have existing clusters running a HAProxy-based load balancer, you can continue running your workloads and the upgrade will successfully complete.
52
+
If you run an upgrade, the load balancer configuration (`loadBalancerSku` and `count`) you defined during installation remains the same after the upgrade completes. However, if you want to update `loadBalancerSku` during an upgrade, you must redeploy your workload clusters. If you have existing clusters running a HAProxy-based load balancer, you can continue running your workloads and the upgrade completes successfully.
53
53
54
54
> [!IMPORTANT]
55
-
> If you change from using a custom load balancer to using the default load balancer, you're required to redeploy your workload cluster with the new load balancer configuration. For instructions on how to configure the default load balancer, see [Configure load balancer](configure-load-balancer.md).
56
-
57
-
## Next steps
58
-
59
-
To learn more about Kubernetes services, see the [Kubernetes services documentation](https://kubernetes.io/docs/concepts/services-networking/service/).
55
+
> If you change from using a custom load balancer to using the default load balancer, you're required to redeploy your workload cluster with the new load balancer configuration. For information about how to configure the default load balancer, see [Configure load balancer](configure-load-balancer.md).
60
56
61
-
57
+
## Next steps
62
58
63
-
59
+
To learn more about Kubernetes services, see the [Kubernetes services documentation](https://kubernetes.io/docs/concepts/services-networking/service/).
Copy file name to clipboardExpand all lines: AKS-Arc/connect-to-arc.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,13 +5,13 @@ author: sethmanheim
5
5
ms.topic: how-to
6
6
ms.custom:
7
7
- devx-track-azurepowershell
8
-
ms.date: 07/02/2024
8
+
ms.date: 04/02/2025
9
9
ms.author: sethm
10
10
ms.lastreviewed: 1/14/2022
11
11
ms.reviewer: abha
12
12
13
13
# Intent: As an IT Pro, I want to learn how to connect an Azure Kubernetes Service cluster to Kubernetes so I can extend those capabilities to my Kubernetes clusters.
14
-
# Keyword: AKS cluster Azure Local cluster
14
+
# Keyword: AKS cluster Kubernetes cluster
15
15
---
16
16
17
17
# Connect an Azure Kubernetes Service cluster to Azure Arc
Copy file name to clipboardExpand all lines: AKS-Arc/deploy-arc-data-services.md
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,10 +3,11 @@ title: Deploy Azure Arc-enabled data services in AKS enabled by Azure Arc
3
3
description: Learn how to deploy Azure Arc-enabled data services in AKS enabled by Azure Arc.
4
4
author: sethmanheim
5
5
ms.topic: how-to
6
-
ms.date: 07/03/2024
6
+
ms.date: 04/02/2025
7
7
ms.author: sethm
8
8
ms.lastreviewed: 1/14/2022
9
9
ms.reviewer: rbaziwane
10
+
10
11
# Intent: As an IT Pro, I need to learn the requirements needed in order to deploy Azure Arc data.
11
12
# Keyword: Azure Arc data services
12
13
---
@@ -17,7 +18,7 @@ ms.reviewer: rbaziwane
17
18
18
19
This article provides a checklist of prerequisites you can follow to deploy Azure Arc-enabled data services on Azure Kubernetes Service (AKS) enabled by Azure Arc. You must have [AKS](kubernetes-walkthrough-powershell.md) installed before using the checklist.
19
20
20
-
## Prerequisites for AKS on Azure Local and Windows Server
21
+
## Prerequisites for AKS on Windows Server
21
22
22
23
> [!div class="checklist"]
23
24
> *[Provision a workload cluster with only Linux node pools](use-node-pools.md).
@@ -28,13 +29,13 @@ This article provides a checklist of prerequisites you can follow to deploy Azur
28
29
> [!div class="checklist"]
29
30
> *[Connect your clusters to Azure Arc for Kubernetes](connect-to-arc.md).
30
31
31
-
Confirm whether custom location is enabled on your Kubernetes cluster by running the following command and checking for `customLocation: enabled: true`:
32
+
Confirm whether the custom location is enabled on your Kubernetes cluster by running the following command and checking for `customLocation: enabled: true`:
32
33
33
34
```console
34
35
helm get values azure-arc
35
36
```
36
37
37
-
If custom location isn't enabled, run the following CLI command:
38
+
If the custom location isn't enabled, run the following CLI command:
38
39
39
40
```azurecli
40
41
az connectedk8s enable-features -n <clusterName> -g <resourceGroupName> --features cluster-connect custom-locations
|`ipAddressPrefix`| Subnet prefix for creating the virtual network in the network controller. This prefix is a subnet prefix, not a virtual network prefix. Currently, MOC only supports a single subnet. |
46
46
|`gateway`| Default gateway for the subnet. Must be the first IP of the subnet. SDN doesn't support custom default gateways for virtual networks. |
47
47
|`dnsServers`| DNS servers reachable from SDN VMs public IP or other (for example, an L3 connection), used for name resolutions. |
48
-
|`K8sNodeIpPoolStart`, `K8sNodeIpPoolEnd`| A subset or full IP range from the `ipAddressPrefix`. Used by MOC IPAM to allocate IP addresses for nodes. Useful if deploying non-AKS on Azure Local VMs on the same subnet, but not recommended due to possible misconfiguration. |
48
+
|`K8sNodeIpPoolStart`, `K8sNodeIpPoolEnd`| A subset or full IP range from the `ipAddressPrefix`. Used by MOC IPAM to allocate IP addresses for nodes. Useful if deploying non-AKS on Windows Server VMs on the same subnet, but not recommended due to possible misconfiguration. |
49
49
50
50
## Create a Kubernetes cluster on your SDN virtual network
0 commit comments