Skip to content

Commit 5edeb9c

Browse files
authored
Merge branch 'main' into patch-37
2 parents 0663bda + 24bc658 commit 5edeb9c

File tree

111 files changed

+782
-894
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

111 files changed

+782
-894
lines changed

.openpublishing.publish.config.json

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@
66
"build_output_subfolder": "adaptive-cloud",
77
"locale": "en-us",
88
"monikers": [],
9+
"moniker_ranges": [],
910
"open_to_public_contributors": false,
1011
"type_mapping": {
1112
"Conceptual": "Content"
@@ -29,14 +30,12 @@
2930
"template_folder": "_themes"
3031
},
3132
{
32-
"docset_name": "AzureLocal",
33-
"build_source_folder": "azure-local",
34-
"build_output_subfolder": "AzureLocal",
33+
"docset_name": "azure-managed-lustre",
34+
"build_source_folder": "azure-managed-lustre",
35+
"build_output_subfolder": "azure-managed-lustre",
3536
"locale": "en-us",
3637
"monikers": [],
37-
"moniker_ranges": [
38-
">=azloc-2408"
39-
],
38+
"moniker_ranges": [],
4039
"open_to_public_contributors": true,
4140
"type_mapping": {
4241
"Conceptual": "Content"
@@ -45,12 +44,14 @@
4544
"template_folder": "_themes"
4645
},
4746
{
48-
"docset_name": "azure-managed-lustre",
49-
"build_source_folder": "azure-managed-lustre",
50-
"build_output_subfolder": "azure-managed-lustre",
47+
"docset_name": "AzureLocal",
48+
"build_source_folder": "azure-local",
49+
"build_output_subfolder": "AzureLocal",
5150
"locale": "en-us",
5251
"monikers": [],
53-
"moniker_ranges": [],
52+
"moniker_ranges": [
53+
">=azloc-2408"
54+
],
5455
"open_to_public_contributors": true,
5556
"type_mapping": {
5657
"Conceptual": "Content"
Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path": "adaptive-cloud/app-solutions/index.yml",
5+
"redirect_url": "/azure-stack/user/overview-patterns-solution-examples",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "adaptive-cloud/app-solutions/overview-app-design-considerations.md",
10+
"redirect_url": "/azure/architecture/guide",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "adaptive-cloud/app-solutions/overview-patterns-solution-examples.md",
15+
"redirect_url": "/azure-stack/user/overview-patterns-solution-examples",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "adaptive-cloud/app-solutions/pattern-cicd-pipeline.md",
20+
"redirect_url": "/azure-stack/user/pattern-cicd-pipeline",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path": "adaptive-cloud/app-solutions/pattern-cross-cloud-scale-onprem-data.md",
25+
"redirect_url": "/azure-stack/user/pattern-cross-cloud-scale-on-premises-data",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path": "adaptive-cloud/app-solutions/pattern-cross-cloud-scale.md",
30+
"redirect_url": "/azure-stack/user/pattern-cross-cloud-scale",
31+
"redirect_document_id": false
32+
},
33+
{
34+
"source_path": "adaptive-cloud/app-solutions/pattern-geo-distributed.md",
35+
"redirect_url": "/azure-stack/user/pattern-geo-distributed",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path": "adaptive-cloud/app-solutions/pattern-highly-available-kubernetes.md",
40+
"redirect_url": "/azure-stack/user/pattern-highly-available-kubernetes",
41+
"redirect_document_id": false
42+
},
43+
{
44+
"source_path": "adaptive-cloud/app-solutions/pattern-hybrid-relay.md",
45+
"redirect_url": "/azure-stack/user/pattern-hybrid-relay",
46+
"redirect_document_id": false
47+
},
48+
{
49+
"source_path": "adaptive-cloud/app-solutions/pattern-out-of-stock-at-edge.md",
50+
"redirect_url": "/azure-stack/user/pattern-out-of-stock-at-edge",
51+
"redirect_document_id": false
52+
},
53+
{
54+
"source_path": "adaptive-cloud/app-solutions/pattern-retail-footfall-detection.md",
55+
"redirect_url": "/azure-stack/user/pattern-retail-footfall-detection",
56+
"redirect_document_id": false
57+
},
58+
{
59+
"source_path": "adaptive-cloud/app-solutions/pattern-tiered-data-analytics.md",
60+
"redirect_url": "/azure-stack/user/pattern-tiered-data-analytics",
61+
"redirect_document_id": false
62+
},
63+
{
64+
"source_path": "adaptive-cloud/app-solutions/pattern-train-ml-model-at-edge.md",
65+
"redirect_url": "/azure-stack/user/pattern-train-machine-learning-model-at-edge",
66+
"redirect_document_id": false
67+
}
68+
]
69+
}

AKS-Arc/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -168,7 +168,7 @@
168168
items:
169169
- name: Azure Local
170170
href: /azure/azure-local
171-
- name: Azure Adaptive Cloud
171+
- name: Azure adaptive cloud
172172
href: /azure/adaptive-cloud
173173
- name: Azure Arc Jumpstart
174174
href: https://azurearcjumpstart.com/azure_arc_jumpstart/azure_arc_k8s/aks_stack_hci/

AKS-Arc/aks-create-clusters-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ This article describes how to create Kubernetes clusters in Azure Local using th
2929
## Create a Kubernetes cluster
3030

3131
1. Sign in to the [Azure portal](https://portal.azure.com/).
32-
1. On the Azure portal search bar, type Kubernetes Azure Arc.
32+
1. On the Azure portal search bar, type **Kubernetes Azure Arc**.
3333
1. Select **Add > Create a Kubernetes cluster with Azure Arc**:
3434

3535
:::image type="content" source="media/aks-create-clusters-portal/cluster-portal.png" alt-text="Screenshot showing cluster creation page on the portal." lightbox="media/aks-create-clusters-portal/cluster-portal.png":::

AKS-Arc/aks-edge-howto-multi-nic.md

Lines changed: 5 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to attach multiple network interfaces to an AKS Edge Esse
44
author: sethmanheim
55
ms.author: sethm
66
ms.topic: how-to
7-
ms.date: 07/12/2024
7+
ms.date: 02/25/2025
88
ms.custom: template-how-to, linux-related-content
99
---
1010

@@ -61,19 +61,11 @@ To deploy a Linux node with multiple NICs, you must add your secondary interface
6161

6262
## Verify multiple NIC network configuration settings
6363

64-
After you successfully install and deploy the AKS Edge Essentials node, follow these steps to make sure both primary, and secondary interfaces were created and added to the Linux node:
64+
After you successfully install and deploy the AKS Edge Essentials node, follow these steps to make sure both the primary and secondary interfaces were created and added to the Linux node. To check the interfaces, run the following command:
6565

66-
1. Check the primary interface:
67-
68-
```powershell
69-
Invoke-AksEdgeNodeCommand -NodeType "Linux" -command "sudo ip addr eth0"
70-
```
71-
72-
1. Check the secondary network interface. If you added more than one extra interface, it appears as **ethX** with **X** being the number of extra network interfaces:
73-
74-
```powershell
75-
Invoke-AksEdgeNodeCommand -NodeType "Linux" -command "sudo ip addr eth1"
76-
```
66+
```powershell
67+
Invoke-AksEdgeNodeCommand -NodeType "Linux" -command "sudo ip addr"
68+
```
7769

7870
## Configure Multus CNI plugin
7971

AKS-Arc/azure-rbac-23h2.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ ms.custom: devx-track-azurecli
66
author: sethmanheim
77
ms.author: sethm
88
ms.reviewer: leslielin
9-
ms.date: 07/26/2024
10-
ms.lastreviewed: 07/26/2024
9+
ms.date: 02/21/2025
10+
ms.lastreviewed: 02/21/2025
1111

1212
# Intent: As an IT Pro, I want to use Azure RBAC to authenticate connections to my AKS clusters over the Internet or on a private network.
1313
# Keyword: Kubernetes role-based access control AKS Azure RBAC AD
@@ -46,9 +46,15 @@ Before you begin, make sure you have the following prerequisites:
4646
```
4747

4848
- To interact with Kubernetes clusters, you must install [**kubectl**](https://kubernetes.io/docs/tasks/tools/) and [**kubelogin**](https://azure.github.io/kubelogin/install.html).
49-
- You need the following permissions to enable Azure RBAC while creating a Kubernetes cluster:
50-
- To create a Kubernetes cluster, you need the **Azure Kubernetes Service Arc Contributor** role.
51-
- To use the `--enable-azure-rbac` parameter, you need the **Role Based Access Control Administrator** role for access to the **Microsoft.Authorization/roleAssignments/write** permission. For more information, see [Azure built-in roles](/azure/role-based-access-control/built-in-roles/general).
49+
- The following permissions are required to enable Azure RBAC when creating a Kubernetes cluster:
50+
- To create a Kubernetes cluster, the [**Azure Kubernetes Service Arc Contributor**](/azure/role-based-access-control/built-in-roles/containers#azure-kubernetes-service-arc-contributor-role) role is required.
51+
- To use the `--enable-azure-rbac` parameter, the [**Role Based Access Control Administrator**](/azure/role-based-access-control/built-in-roles/privileged#role-based-access-control-administrator) role is required for access to the **Microsoft.Authorization/roleAssignments/write** permission.
52+
- To assign these roles, use the [az role assignment create](/cli/azure/role/assignment#az-role-assignment-create) CLI command, or follow [Assign Azure roles using Azure CLI](/azure/role-based-access-control/role-assignments-cli):
53+
54+
```azurecli
55+
az role assignment create --assignee <assignee-object-id> --role <role-name-or-id> --scope $ARM_ID
56+
```
57+
5258
- New role assignments can take up to five minutes to propagate and be updated by the authorization server.
5359
- Once Azure RBAC is enabled, you can access your Kubernetes cluster with the given permissions using either direct mode or proxy mode.
5460
- To access the Kubernetes cluster directly using the `az aksarc get-credentials` command, you need the **Microsoft.HybridContainerService/provisionedClusterInstances/listUserKubeconfig/action**, which is included in the **Azure Kubernetes Service Arc Cluster User** role permission.

AKS-Arc/breadcrumb/toc.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
1-
- name: Adaptive Cloud documentation
2-
tocHref: /azure/adaptive-cloud/
3-
topicHref: /azure/adaptive-cloud/index
4-
items:
1+
- name: Azure
2+
tocHref: /azure
3+
topicHref: /azure/index
4+
items:
55
- name: AKS enabled by Azure Arc
66
tocHref: /azure/aks/aksarc/
77
topicHref: /azure/aks/aksarc/index
8-
### items:
9-
### For contextual TOC
8+
### items:
9+
### For contextual TOC
1010
- name: AKS enabled by Azure Arc
1111
tocHref: /azure/azure-arc/kubernetes/
1212
topicHref: /azure/aks/aksarc/index

AKS-Arc/concepts-support.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Tested resource limits, VM sizes, and regions for AKS enabled by Azure Ar
33
description: Resource limits, VM sizes, regions for Azure Kubernetes Service (AKS) enabled by Azure Arc.
44
author: sethmanheim
55
ms.topic: conceptual
6-
ms.date: 12/21/2023
6+
ms.date: 02/20/2025
77
ms.author: sethm
88
ms.lastreviewed: 02/03/2022
99
ms.reviewer: mamezgeb

AKS-Arc/create-clusters-bicep.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Create Kubernetes clusters using Bicep
33
description: Learn how to create Kubernetes clusters in Azure Local using Bicep.
44
ms.topic: how-to
55
ms.custom: devx-track-azurecli
6-
ms.date: 07/26/2024
6+
ms.date: 02/26/2025
77
author: sethmanheim
88
ms.author: sethm
99
ms.reviewer: haojiehang
@@ -34,22 +34,25 @@ Before you begin, make sure you have the following prerequisites:
3434

3535
## Create an SSH key pair
3636

37-
To create an SSH key pair (same as Azure AKS), use the following procedure:
37+
Create an SSH key pair in Azure and store the private key file for troubleshooting and log collection purposes. For detailed instructions, see [Create and store SSH keys with the Azure CLI](/azure/virtual-machines/ssh-keys-azure-cli) or in the [Azure portal](/azure/virtual-machines/ssh-keys-portal).
3838

39-
1. [Open a Cloud Shell session](https://shell.azure.com) in your browser or open a terminal on your local machine.
40-
1. Create an SSH key pair using `az sshkey create`:
39+
1. [Open a Cloud Shell session](https://shell.azure.com/) in your web browser or launch a terminal on your local machine.
40+
1. Create an SSH key pair using the [az sshkey create](/cli/azure/sshkey#az-sshkey-create) command:
4141

4242
```azurecli
43-
az sshkey create --name <Public_SSH_Key> --resource-group <Resource_Group_Name>
43+
az sshkey create --name "mySSHKey" --resource-group $<resource_group_name>
4444
```
4545

46-
Or, create a local SSH key pair using `ssh-keygen`:
46+
or, use the `ssh-keygen` command:
4747

48-
```bash
49-
ssh-keygen -t rsa -b 4096
48+
```azurecli
49+
ssh-keygen -t rsa -b 4096
5050
```
5151

52-
It's recommended that you create an SSH key pair in Azure, as you can use it later for node access or troubleshooting. For more information about creating SSH keys, see [Create and manage SSH keys for authentication in Azure](/azure/virtual-machines/linux/create-ssh-keys-detailed) and [Restrict SSH Access](restrict-ssh-access.md).
52+
1. Retrieve the value of your public key from Azure or from your local machine under **/.ssh/id_rsa.pub**.
53+
54+
For more options, you can either follow [Configure SSH keys for an AKS cluster](/azure/aks/aksarc/configure-ssh-keys) to create SSH keys, or use [Restrict SSH access](/azure/aks/aksarc/restrict-ssh-access) during cluster creation. To access nodes afterward, see [Connect to Windows or Linux worker nodes with SSH](/azure/aks/aksarc/ssh-connect-to-windows-and-linux-worker-nodes).
55+
5356

5457
## Download and update the Bicep scripts
5558

AKS-Arc/create-clusters-terraform.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to create Kubernetes clusters using Terraform.
44
author: sethmanheim
55
ms.author: sethm
66
ms.topic: how-to
7-
ms.date: 02/10/2025
7+
ms.date: 02/26/2025
88

99
---
1010

@@ -32,23 +32,25 @@ Before you begin, make sure you have the following prerequisites:
3232

3333
## Create an SSH key pair
3434

35-
To create an SSH key pair (same as Azure AKS), use the following procedure:
35+
Create an SSH key pair in Azure and store the private key file for troubleshooting and log collection purposes. For detailed instructions, see [Create and store SSH keys with the Azure CLI](/azure/virtual-machines/ssh-keys-azure-cli) or in the [Azure portal](/azure/virtual-machines/ssh-keys-portal).
3636

37-
1. [Open a Cloud Shell session](https://shell.azure.com/) in your browser.
38-
1. Create an SSH key pair using the [az sshkey create](/cli/azure/sshkey#az-sshkey-create) command, [from the portal](/azure/virtual-machines/ssh-keys-portal), or the `ssh-keygen`command:
37+
1. [Open a Cloud Shell session](https://shell.azure.com/) in your web browser or launch a terminal on your local machine.
38+
1. Create an SSH key pair using the [az sshkey create](/cli/azure/sshkey#az-sshkey-create) command:
3939

4040
```azurecli
41-
az sshkey create --name "mySSHKey" --resource-group "myResourceGroup"
41+
az sshkey create --name "mySSHKey" --resource-group $<resource_group_name>
4242
```
4343

44-
or
44+
or, use the `ssh-keygen` command:
4545

4646
```azurecli
4747
ssh-keygen -t rsa -b 4096
4848
```
4949

5050
1. Retrieve the value of your public key from Azure or from your local machine under **/.ssh/id_rsa.pub**.
5151

52+
For more options, you can either follow [Configure SSH keys for an AKS cluster](/azure/aks/aksarc/configure-ssh-keys) to create SSH keys, or use [Restrict SSH access](/azure/aks/aksarc/restrict-ssh-access) during cluster creation. To access nodes afterward, see [Connect to Windows or Linux worker nodes with SSH](/azure/aks/aksarc/ssh-connect-to-windows-and-linux-worker-nodes).
53+
5254
## Sign in to Azure
5355

5456
Terraform only supports authenticating to Azure with the Azure CLI using [`az login`](/cli/azure/reference-index#az-login). Authenticating using Azure PowerShell isn't supported. Therefore, while you can use the Azure PowerShell module when doing your Terraform work, you must first [authenticate to Azure](/azure/developer/terraform/authenticate-to-azure):

0 commit comments

Comments
 (0)