Skip to content

Commit 6724241

Browse files
committed
Last set
1 parent e9ae440 commit 6724241

File tree

4 files changed

+15
-15
lines changed

4 files changed

+15
-15
lines changed

AKS-Arc/aks-hci-ip-address-planning.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,10 @@
22
title: IP address planning for AKS enabled by Azure Arc
33
description: Learn about how to plan for IP addresses and reservation, to deploy AKS Arc in production.
44
ms.topic: article
5-
ms.date: 11/19/2024
5+
ms.date: 08/13/2025
66
author: sethmanheim
77
ms.author: sethm
8-
ms.reviewer: abha
8+
ms.reviewer: srikantsarwa
99
ms.lastreviewed: 10/08/2024
1010
---
1111

@@ -17,7 +17,7 @@ IP address planning for AKS enabled by Azure Arc involves designing a network th
1717

1818
## Simple IP address planning for Kubernetes clusters and applications
1919

20-
In the following scenario walk-through, you reserve IP addresses from a single network for your Kubernetes clusters and services. This example is the most straightforward and simple scenario for IP address assignment.
20+
In the following scenario walkthrough, you reserve IP addresses from a single network for your Kubernetes clusters and services. This example is the most straightforward and simple scenario for IP address assignment.
2121

2222
| IP address requirement | Minimum number of IP addresses | How and where to make this reservation |
2323
|------------------|---------|---------------|
@@ -52,7 +52,7 @@ Continuing with this example, and adding it to the following table, you get:
5252

5353
#### Example CLI commands for IP address reservation for Kubernetes clusters and applications
5454

55-
This section describes the set of commands Jane runs for her scenario. First, create a logical network with an IP pool that has at least 16 IP addresses. We created the IP pool with 20 IP addresses to provide the option to scale on day N. For detailed information about parameter options in logical networks, see [`az stack-hci-vm network lnet create`](/cli/azure/stack-hci-vm/network/lnet#az-stack-hci-vm-network-lnet-create):
55+
This section describes the set of commands Jane runs for her scenario. First, create a logical network with an IP pool that has at least 16 IP addresses. We created the IP pool with 20 IP addresses to provide the option to scale on day N. For detailed information about parameter options in logical networks, see [az stack-hci-vm network lnet create](/cli/azure/stack-hci-vm/network/lnet#az-stack-hci-vm-network-lnet-create):
5656

5757
```azurecli
5858
$ipPoolStart = "10.220.32.18"
@@ -72,7 +72,7 @@ Now you can enable MetalLB load balancer with an IP pool of 3 IP addresses, in t
7272
az k8s-runtime load-balancer create --load-balancer-name $lbName --resource-uri subscriptions/$subscription/resourceGroups/$resource_group/providers/Microsoft.Kubernetes/connectedClusters/metallb-demo --addresses 10.220.32.47-10.220.32.49 --advertise-mode ARP
7373
```
7474

75-
### LNETs considerations for AKS clusters and Arc VMs
75+
### LNET considerations for AKS clusters and Arc VMs
7676

7777
Logical networks on Azure Local are used by both AKS clusters and Arc VMs. You can configure logical networks in one of the following 2 ways:
7878

@@ -81,7 +81,7 @@ Logical networks on Azure Local are used by both AKS clusters and Arc VMs. You c
8181

8282
Sharing a logical network between AKS and Arc VMs on Azure Local offers the benefit of streamlined communication, cost savings, and simplified network management. However, this approach also introduces potential challenges such as resource contention, security risks, and complexity in troubleshooting.
8383

84-
| **Criteria** | **Sharing a logical network** | **Defining separate logical networks** |
84+
| Criteria | Sharing a logical network | Defining separate logical networks |
8585
|-------------------------------------------|----------------------------------------------------------------|----------------------------------------------------------------|
8686
| **Configuration complexity** | Simpler configuration with a single network, reducing setup complexity. | More complex setup, as you need to configure multiple logical networks for VMs and AKS clusters.
8787
| **Scalability** | Potential scalability limitations as both Arc VMs and AKS clusters share network resources. | More scalable since network resources are separated and can scale independently. |
@@ -95,9 +95,9 @@ This section describes the IP address ranges used by Kubernetes for pod and serv
9595

9696
### Pod network CIDR
9797

98-
Pod network CIDR is a range of IP addresses used by Kubernetes to assign unique IP addresses to the individual pods running within a Kubernetes cluster. Each pod gets its own IP address within this range, allowing pods to communicate with each other and with services within the cluster. In AKS, pod IP addresses are assigned via *Calico CNI in VXLAN mode*. Calico VXLAN helps create *Overlay networks*, where the IP addresses of pods (from the pod network CIDR) are virtualized and tunneled through the physical network. In this mode, each pod is assigned an IP address from the pod network CIDR, but this IP address is not directly routable on the physical network. Instead, it is encapsulated within the network packets and sent through the underlying physical network to reach its destination pod on another node.
98+
Pod network CIDR is a range of IP addresses used by Kubernetes to assign unique IP addresses to the individual pods running within a Kubernetes cluster. Each pod gets its own IP address within this range, allowing pods to communicate with each other and with services within the cluster. In AKS, pod IP addresses are assigned via *Calico CNI in VXLAN* mode. Calico VXLAN helps create *Overlay networks*, where the IP addresses of pods (from the pod network CIDR) are virtualized and tunneled through the physical network. In this mode, each pod is assigned an IP address from the pod network CIDR, but this IP address is not directly routable on the physical network. Instead, it is encapsulated within the network packets and sent through the underlying physical network to reach its destination pod on another node.
9999

100-
AKS provides a **default value of 10.244.0.0/16** for the pod network CIDR. AKS does support customizations for the pod network CIDR. You can set your own value using the [`--pod-cidr`](/cli/azure/aksarc#az-aksarc-create) parameter when creating the AKS cluster. Ensure that the CIDR IP range is large enough to accommodate the maximum number of pods per node and across the Kubernetes cluster.
100+
AKS provides a default value of 10.244.0.0/16 for the pod network CIDR. AKS does support customizations for the pod network CIDR. You can set your own value using the [--pod-cidr](/cli/azure/aksarc#az-aksarc-create) parameter when creating the AKS cluster. Ensure that the CIDR IP range is large enough to accommodate the maximum number of pods per node and across the Kubernetes cluster.
101101

102102
### Service network CIDR
103103

@@ -107,7 +107,7 @@ The Service network CIDR is the range of IP addresses reserved for Kubernetes se
107107
- NodePort: Exposes the service on a specific port on each node's IP address. The ClusterIP is still used internally, but external access is through the node IPs and a specific port.
108108
- LoadBalancer: This type creates a cloud-provider-managed load balancer and exposes the service externally. The cloud provider typically manages the external IP assignment, while the internal ClusterIP remains within the service network CIDR.
109109

110-
AKS provides a **default value of 10.96.0.0/12** for the service network CIDR. AKS does not support customizations for the service network CIDR today.
110+
AKS provides a default value of 10.96.0.0/12 for the service network CIDR. AKS does not support customizations for the service network CIDR today.
111111

112112
## Next steps
113113

azure-stack/operator/azure-stack-app-service-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Azure App Service on Azure Stack overview
33
description: Overview of Azure App Service and Azure Functions on Azure Stack Hub.
44
author: sethmanheim
55
ms.topic: concept-article
6-
ms.date: 01/24/2025
6+
ms.date: 08/13/2025
77
ms.author: sethm
88
ms.reviewer: anwestg
99
ms.lastreviewed: 01/13/2019
@@ -24,7 +24,7 @@ Azure App Service enables you to automate business processes and host cloud APIs
2424

2525
Here are some key features and capabilities of Azure App Service:
2626

27-
- **Multiple languages and frameworks**: Azure App Service has first-class support for ASP.NET, Node.js, Java, PHP, and Python. You can also run Windows PowerShell and other scripts or executables on App Service VMs.
27+
- **Multiple languages and frameworks**: Azure App Service has first-class support for ASP.NET, Node.js, Java, PHP, and Python. You can also run Windows PowerShell and other scripts or executables on App Service virtual machines (VMs).
2828
- **DevOps optimization**: Set up continuous integration and deployment with GitHub, local Git, or BitBucket. Promote updates through test and staging environments, and manage your apps in App Service by using Azure PowerShell or the cross-platform command-line interface (Azure CLI).
2929
- **Visual Studio integration**: Dedicated tools in Visual Studio streamline the work of creating and deploying apps.
3030

azure-stack/operator/azure-stack-network.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Network integration planning for Azure Stack Hub
33
description: Learn how to plan for datacenter network integration with Azure Stack Hub integrated systems.
44
author: sethmanheim
55
ms.topic: article
6-
ms.date: 01/27/2025
6+
ms.date: 08/13/2025
77
ms.author: sethm
88
ms.lastreviewed: 03/18/2022
99

@@ -22,7 +22,7 @@ This article provides Azure Stack Hub network infrastructure information to help
2222
2323
## Physical network design
2424

25-
The Azure Stack Hub solution requires a resilient and highly available physical infrastructure to support its operation and services. To integrate Azure Stack Hub to the network, it requires uplinks from the Top-of-Rack switches (ToR) to the nearest switch or router, which in this article is referred as *Border*. The ToRs can be uplinked to a single or a pair of Borders. The ToR is pre-configured by our automation tool. It expects a minimum of one connection between ToR and Border when using BGP Routing and a minimum of two connections (one per ToR) between ToR and Border when using Static Routing, with a maximum of four connections on either routing option. These connections are limited to SFP+ or SFP28 media and a minimum of one GB speed. Check with your original equipment manufacturer (OEM) hardware vendor for availability. The following diagram presents the recommended design:
25+
The Azure Stack Hub solution requires a resilient and highly available physical infrastructure to support its operation and services. To integrate Azure Stack Hub to the network, it requires uplinks from the Top-of-Rack switches (ToR) to the nearest switch or router, which in this article is referred as the *Border*. The ToRs can be uplinked to a single or a pair of Borders. The ToR is pre-configured by our automation tool. It expects a minimum of one connection between ToR and Border when using BGP Routing and a minimum of two connections (one per ToR) between ToR and Border when using Static Routing, with a maximum of four connections on either routing option. These connections are limited to SFP+ or SFP28 media and a minimum of one GB speed. Check with your original equipment manufacturer (OEM) hardware vendor for availability. The following diagram presents the recommended design:
2626

2727
![Recommended Azure Stack network design](media/azure-stack-network/physical-network.svg)
2828

azure-stack/operator/azure-stack-prepare-pki-certs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Prepare Azure Stack Hub PKI certificates for deployment or rotation
33
description: Learn how to prepare PKI certificates for Azure Stack Hub deployment or for rotating secrets.
44
author: sethmanheim
55
ms.topic: how-to
6-
ms.date: 01/30/2025
6+
ms.date: 08/13/2025
77
ms.author: sethm
88
ms.lastreviewed: 10/19/2020
99

@@ -29,7 +29,7 @@ In this article, you learn how to import, package, and validate external certifi
2929

3030
Your system should meet the following prerequisites before packaging PKI certificates for an Azure Stack Hub deployment:
3131

32-
- Certificates returned from Certificate Authority are stored in a single directory, in .cer format (other configurable formats such as .cert, .sst, or .pfx).
32+
- Certificates returned from the Certificate Authority are stored in a single directory, in .cer format (other configurable formats such as .cert, .sst, or .pfx).
3333
- Windows 10, or Windows Server 2016 or later.
3434
- Use the same system that generated the Certificate Signing Request (unless you're targeting a certificate prepackaged into PFXs).
3535
- Use elevated PowerShell sessions.

0 commit comments

Comments
 (0)