You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: AKS-Hybrid/aks-hci-ip-address-planning.md
+5-6Lines changed: 5 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: IP address planning for AKS
3
3
description: Learn about how to plan for IP addresses and reservation, to deploy AKS in production.
4
4
ms.topic: conceptual
5
-
ms.date: 10/08/2024
5
+
ms.date: 11/19/2024
6
6
author: sethmanheim
7
7
ms.author: sethm
8
8
ms.reviewer: abha
@@ -15,16 +15,15 @@ ms.lastreviewed: 10/08/2024
15
15
16
16
IP address planning for AKS involves designing a network that supports applications, node pools, pod networks, service communication, and external access. This article walks you through some key considerations for effective IP address planning, and minimum number of IP addresses required to deploy AKS in production. See the [AKS networking concepts and requirements](aks-hci-network-system-requirements.md) before reading this article.
17
17
18
-
19
18
## Simple IP address planning for Kubernetes clusters and applications
20
19
21
20
In the following scenario walk-through, you reserve IP addresses from a single network for your Kubernetes clusters and services. This example is the most straightforward and simple scenario for IP address assignment.
22
21
23
22
| IP address requirement | Minimum number of IP addresses | How and where to make this reservation |
24
23
|------------------|---------|---------------|
25
-
| AKS Arc VM IPs | Reserve one IP address for every worker node in your Kubernetes cluster. For example, if you want to create 3 node pools with 3 nodes in each node pool, you need to have 9 IP addresses in your IP pool. | Reserve IP addresses through IP pools in Arc VM logical network. |
26
-
| AKS Arc K8s version upgrade IPs | Because AKS Arc performs rolling upgrades, reserve one IP address for every AKS Arc cluster for Kubernetes version upgrade operations. | Reserve IP addresses through IP pools in Arc VM logical network. |
27
-
| Control plane IP | Reserve one IP address for every Kubernetes cluster in your environment. For example, if you want to create 5 clusters in total, reserve 5 IP addresses, one for each Kubernetes cluster. | Reserve IP addresses through IP pools in Arc VM logical network. |
24
+
| AKS Arc VM IPs | Reserve one IP address for every worker node in your Kubernetes cluster. For example, if you want to create 3 node pools with 3 nodes in each node pool, you need 9 IP addresses in your IP pool. | Reserve IP addresses through IP pools in the Arc VM logical network. |
25
+
| AKS Arc K8s version upgrade IPs | Because AKS Arc performs rolling upgrades, reserve one IP address for every AKS Arc cluster for Kubernetes version upgrade operations. | Reserve IP addresses through IP pools in the Arc VM logical network. |
26
+
| Control plane IP | Reserve one IP address for every Kubernetes cluster in your environment. For example, if you want to create 5 clusters in total, reserve 5 IP addresses, one for each Kubernetes cluster. | Reserve IP addresses through IP pools in the Arc VM logical network. |
28
27
| Load balancer IPs | The number of IP addresses reserved depends on your application deployment model. As a starting point, you can reserve one IP address for every Kubernetes service. | Reserve IP addresses in the same subnet as the Arc VM logical network, but outside the IP pool. |
29
28
30
29
### Example walkthrough for IP address reservation for Kubernetes clusters and applications
@@ -80,7 +79,7 @@ AKS provides a **default value of 10.244.0.0/16** for the pod network CIDR. AKS
80
79
81
80
The Service network CIDR is the range of IP addresses reserved for Kubernetes services like LoadBalancers, ClusterIP, and NodePort within a cluster. Kubernetes supports the following service types:
82
81
- ClusterIP: The default service type, which exposes the service within the cluster. The IP assigned from the Service network CIDR is only accessible within the Kubernetes cluster.
83
-
- NodePort: Exposes the service on a specific port on each node’s IP address. The ClusterIP is still used internally, but external access is through the node IPs and a specific port.
82
+
- NodePort: Exposes the service on a specific port on each node's IP address. The ClusterIP is still used internally, but external access is through the node IPs and a specific port.
84
83
- LoadBalancer: This type creates a cloud-provider-managed load balancer and exposes the service externally. The cloud provider typically manages the external IP assignment, while the internal ClusterIP remains within the service network CIDR.
85
84
86
85
AKS provides a **default value of 10.96.0.0/12** for the service network CIDR. AKS does not support customizations for the service network CIDR today.
Copy file name to clipboardExpand all lines: AKS-Hybrid/aks-hci-network-system-requirements.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: AKS enabled by Azure Arc network requirements
3
3
description: Learn about AKS network prerequisites.
4
4
ms.topic: overview
5
-
ms.date: 04/02/2024
5
+
ms.date: 11/19/2024
6
6
author: sethmanheim
7
7
ms.author: sethm
8
8
ms.reviewer: abha
@@ -20,7 +20,7 @@ In this conceptual article, the following key components are introduced. These c
20
20
- Logical network for AKS Arc VMs and control plane IP
21
21
- Load balancer for containerized applications
22
22
23
-
## Logical network for AKS Arc VMs and control plane IP
23
+
## Logical networks for AKS Arc VMs and control plane IP
24
24
25
25
Kubernetes nodes are deployed as specialized virtual machines in AKS enabled by Arc. These VMs are allocated IP addresses to enable communication between Kubernetes nodes. AKS Arc uses Azure Local logical networks to provide IP addresses and networking for the underlying VMs of the Kubernetes clusters. For more information about logical networks, see [Logical networks for Azure Local](/azure-stack/hci/manage/create-logical-networks?tabs=azurecli). You must plan to reserve one IP address per AKS cluster node VM in your Azure Local environment.
The Arc gateway works by introducing two new components:
30
30
31
-
- The **Arc gateway resource** is an Azure Resource that serves as a common front end for Azure traffic. The gateway resource is served on a specific domain/URL. You must create this resource by following the steps outlined in this article. After you successfully create the gateway resource, this domain/URL is included in the success response.
32
-
- The **Arc Proxy** is a new component that runs as its own pod (called "Azure Arc Proxy"). This component acts as a forward proxy used by Azure Arc agents and extensions. There is no configuration required on your part for the Azure Arc Proxy.
31
+
- The **Arc gateway resource** is an Azure resource that serves as a common front end for Azure traffic. The gateway resource is served on a specific domain/URL. You must create this resource by following the steps described in this article. After you successfully create the gateway resource, this domain/URL is included in the success response.
32
+
- The **Arc Proxy** is a new component that runs as its own pod (called *Azure Arc Proxy*). This component acts as a forward proxy used by Azure Arc agents and extensions. There is no configuration required on your part for the Azure Arc Proxy.
33
33
34
-
Visit [how the Azure Arc gateway works](https://learn.microsoft.com/azure/azure-arc/kubernetes/arc-gateway-simplify-networking?tabs=azure-cli) to learn more.
34
+
For more information, see [how the Azure Arc gateway works](/azure/azure-arc/kubernetes/arc-gateway-simplify-networking?tabs=azure-cli).
35
35
36
36
> [!IMPORTANT]
37
-
> Note that Azure Local and AKS do not support TLS terminating proxies, ExpressRoute/site-to-site VPN or private endpoints.
38
-
> In addition, there is a limit of five Arc gateway resources per Azure subscription.
37
+
> Azure Local and AKS do not support TLS terminating proxies, ExpressRoute/site-to-site VPN or private endpoints. Also, there is a limit of five Arc gateway resources per Azure subscription.
39
38
40
39
## Before you begin
41
-
- Ensure you've gone through the [pre-requisites for creating AKS clusters on Azure Local](/aks-hci-network-system-requirements.md)
42
-
-**The following Azure permissions are required** to create Arc gateway resources and manage their association with AKS Arc clusters:
-**An Arc gateway resource** can be created using Azure CLI or Azure portal. Visit [create the Arc gateway resource in Azure](/hci/deploy/deployment-azure-arc-gateway-overview#create-the-arc-gateway-resource-in-azure) for more information on how to create an Arc gateway resource for your AKS clusters and Azure Local. Once you've created the Arc gateway resource, get the gateway resource ID by running the following command:
47
40
48
-
```
49
-
$gatewayId = "(az arcgateway show --name <gateway's name> --resource-group <resource group> --query id -o tsv)"
50
-
```
41
+
- Ensure you've completed the [pre-requisites for creating AKS clusters on Azure Local](/aks-hci-network-system-requirements.md)
42
+
- The following Azure permissions are required to create Arc gateway resources and manage their association with AKS Arc clusters:
- You can create an Arc gateway resource using Azure CLI or the Azure portal. For more information about how to create an Arc gateway resource for your AKS clusters and Azure Local, see [create the Arc gateway resource in Azure](/hci/deploy/deployment-azure-arc-gateway-overview#create-the-arc-gateway-resource-in-azure). When you create the Arc gateway resource, get the gateway resource ID by running the following command:
51
47
48
+
```azurecli
49
+
$gatewayId = "(az arcgateway show --name <gateway's name> --resource-group <resource group> --query id -o tsv)"
50
+
```
52
51
53
52
## Confirm access to required URLs
54
53
55
-
Ensure your Arc gateway URL and all of the URLs below are allowed through your enterprise firewall:
54
+
Ensure your Arc gateway URL and all of the URLs below are allowed through your enterprise firewall:
56
55
57
56
|URL |Purpose |
58
57
|---------|---------|
59
-
|`[Your URL prefix].gw.arc.azure.com`| Your gateway URL. This URL can be obtained by running `az arcgateway list` after you create the resource. |
60
-
|`management.azure.com`|Azure Resource Manager Endpoint, required for ARM control channel. |
58
+
|`[Your URL prefix].gw.arc.azure.com`| Your gateway URL. You can obtain this URL by running `az arcgateway list` after you create the resource. |
59
+
|`management.azure.com`|Azure Resource Manager endpoint, required for the Azure Resource Manager control channel. |
61
60
|`<region>.obo.arc.azure.com`|Required when [Cluster connect](conceptual-cluster-connect.md) is configured. |
62
61
|`login.microsoftonline.com`, `<region>.login.microsoft.com`| Microsoft Entra ID endpoint, used for acquiring identity access tokens. |
63
-
|`gbl.his.arc.azure.com`, `<region>.his.arc.azure.com`|The cloud service endpoint for communicating with Arc Agents. Uses short names, for example `eus` for East US. |
62
+
|`gbl.his.arc.azure.com`, `<region>.his.arc.azure.com`|The cloud service endpoint for communicating with Arc Agents. Uses short names; for example `eus` for East US. |
64
63
|`mcr.microsoft.com`, `*.data.mcr.microsoft.com`|Required to pull container images for Azure Arc agents. |
65
64
66
65
## Create AKS Arc clusters with Arc gateway enabled
66
+
67
67
Run the following command to create AKS Arc clusters with Arc gateway enabled
To audit your gateway's traffic, view the gateway router's logs:
75
+
To audit your gateway traffic, view the gateway router logs:
76
76
77
-
1. Run `kubectl get pods -n azure-arc`
78
-
2. Identify the Arc Proxy pod (its name will begin with `arc-proxy-`).
79
-
3. Run `kubectl logs -n azure-arc <Arc Proxy pod name>`
77
+
1. Run `kubectl get pods -n azure-arc`.
78
+
1. Identify the Arc Proxy pod (its name will begin with `arc-proxy-`).
79
+
1. Run `kubectl logs -n azure-arc <Arc Proxy pod name>`.
80
80
81
-
## Additional scenarios
81
+
## Other scenarios
82
82
83
-
During the public preview, Arc gateway covers endpoints required for AKS Arc clusters, and a portion of endpoints required for additional Arc-enabled scenarios. Based on the scenarios you adopt, additional endpoints are still required to be allowed in your proxy.
83
+
During the public preview, Arc gateway covers endpoints required for AKS Arc clusters, and a portion of endpoints required for additional Arc-enabled scenarios. Based on the scenarios you adopt, additional endpoints must still be allowed in your proxy.
84
84
85
85
All endpoints listed for the following scenarios must be allowed in your enterprise proxy when Arc gateway is in use:
86
86
@@ -102,4 +102,5 @@ All endpoints listed for the following scenarios must be allowed in your enterpr
102
102
-`*.monitoring.azure.com`
103
103
104
104
## Next steps
105
-
-[Deploy extension for MetalLB for Azure Arc enabled Kubernetes clusters](/deploy-load-balancer-cli.md).
105
+
106
+
-[Deploy extension for MetalLB for Azure Arc enabled Kubernetes clusters](deploy-load-balancer-cli.md).
Copy file name to clipboardExpand all lines: AKS-Hybrid/availability-sets.md
+2-5Lines changed: 2 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Availability sets in AKS enabled by Azure Arc
3
3
description: Learn how to enable availability sets in AKS Arc to improve the availability and distribution of your Kubernetes workloads.
4
4
ms.topic: how-to
5
5
author: sethmanheim
6
-
ms.date: 09/06/2024
6
+
ms.date: 11/19/2024
7
7
ms.author: sethm
8
8
ms.reviewer: rbaziwane
9
9
ms.lastreviewed: 08/15/2024
@@ -22,12 +22,9 @@ Availability sets offer several benefits for AKS on Azure Local users, such as:
22
22
- Optimizes the resource usage and performance of your cluster by ensuring that VMs are evenly distributed across the available nodes and not concentrated on a single node or a subset of nodes.
23
23
- Aligns with the best practices and expectations of your customers and partners who are looking for a reliable and consistent on-premises Kubernetes experience.
24
24
25
-
26
25
## Enable availability sets
27
26
28
-
**With AKS on Azure Local, version 23H2, the availability sets feature is enabled by default when you create a node pool.**
29
-
With AKS on Windows Server, you can enable availability sets feature by adding the `-enableAvailabilitySet` parameter when you create an AKS cluster. For example: `New-AksHciCluster -Name <name> -controlPlaneNodeCount 3 -osType Linux -kubernetesVersion $kubernetesVersion -enableAvailabilitySet`.
30
-
27
+
With AKS on Azure Local, version 23H2, the availability sets feature is enabled by default when you create a node pool. With AKS on Windows Server, you can enable availability sets feature by adding the `-enableAvailabilitySet` parameter when you create an AKS cluster; for example, `New-AksHciCluster -Name <name> -controlPlaneNodeCount 3 -osType Linux -kubernetesVersion $kubernetesVersion -enableAvailabilitySet`.
31
28
32
29
## How availability sets work in AKS enabled by Azure Arc
0 commit comments