Skip to content

Commit 80c7229

Browse files
committed
merge conflict fix
2 parents a1158b4 + 0e906c3 commit 80c7229

File tree

211 files changed

+1909
-2835
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

211 files changed

+1909
-2835
lines changed

.openpublishing.redirection.aks.json

Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1439,6 +1439,56 @@
14391439
"source_path": "AKS-Arc/aks-known-issues.md",
14401440
"redirect_url": "/azure/aks/aksarc/aks-troubleshoot",
14411441
"redirect_document_id": false
1442+
},
1443+
{
1444+
"source_path": "AKS-Arc/aks-whats-new-23h2.md",
1445+
"redirect_url": "/azure/aks/aksarc/aks-whats-new-local",
1446+
"redirect_document_id": false
1447+
},
1448+
{
1449+
"source_path": "AKS-Arc/azure-rbac-23h2.md",
1450+
"redirect_url": "/azure/aks/aksarc/azure-rbac-local",
1451+
"redirect_document_id": false
1452+
},
1453+
{
1454+
"source_path": "AKS-Arc/kubernetes-rbac-23h2.md",
1455+
"redirect_url": "/azure/aks/aksarc/kubernetes-rbac-local",
1456+
"redirect_document_id": false
1457+
},
1458+
{
1459+
"source_path": "AKS-Arc/tutorial-kubernetes-prepare-application.md",
1460+
"redirect_url": "/azure/aks/aksarc/overview",
1461+
"redirect_document_id": false
1462+
},
1463+
{
1464+
"source_path": "AKS-Arc/tutorial-kubernetes-prepare-azure-container-registry.md",
1465+
"redirect_url": "/azure/aks/aksarc/overview",
1466+
"redirect_document_id": false
1467+
},
1468+
{
1469+
"source_path": "AKS-Arc/tutorial-kubernetes-deploy-cluster.md",
1470+
"redirect_url": "/azure/aks/aksarc/overview",
1471+
"redirect_document_id": false
1472+
},
1473+
{
1474+
"source_path": "AKS-Arc/tutorial-kubernetes-deploy-application.md",
1475+
"redirect_url": "/azure/aks/aksarc/overview",
1476+
"redirect_document_id": false
1477+
},
1478+
{
1479+
"source_path": "AKS-Arc/tutorial-kubernetes-scale.md",
1480+
"redirect_url": "/azure/aks/aksarc/overview",
1481+
"redirect_document_id": false
1482+
},
1483+
{
1484+
"source_path": "AKS-Arc/tutorial-kubernetes-app-update.md",
1485+
"redirect_url": "/azure/aks/aksarc/overview",
1486+
"redirect_document_id": false
1487+
},
1488+
{
1489+
"source_path": "AKS-Arc/tutorial-kubernetes-upgrade-cluster.md",
1490+
"redirect_url": "/azure/aks/aksarc/overview",
1491+
"redirect_document_id": false
14421492
}
14431493
]
14441494
}

AKS-Arc/TOC.yml

Lines changed: 16 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -11,11 +11,11 @@
1111
href: data-collection.md
1212
- name: Blogs and announcements
1313
href: blogs-announcements.md
14-
- name: AKS on Azure Local, version 23H2
14+
- name: AKS on Azure Local
1515
expanded: true
1616
items:
17-
- name: What's new in AKS on Azure Local, version 23H2
18-
href: aks-whats-new-23h2.md
17+
- name: What's new in AKS on Azure Local
18+
href: aks-whats-new-local.md
1919
- name: Concepts
2020
items:
2121
- name: Architecture
@@ -33,9 +33,11 @@
3333
- name: High availability
3434
items:
3535
- name: Use availability sets
36-
href: availability-sets.md
36+
href: availability-sets.md
3737
- name: Supported scale requirements
3838
href: scale-requirements.md
39+
- name: Connectivity modes
40+
href: connectivity-modes.md
3941
- name: Billing
4042
items:
4143
- name: Pricing details
@@ -76,6 +78,10 @@
7678
href: deploy-load-balancer-portal.md
7779
# - name: Troubleshoot issues
7880
# href: load-balancer-troubleshoot.md
81+
- name: Security
82+
items:
83+
- name: Encrypt etcd secrets
84+
href: encrypt-etcd-secrets.md
7985
- name: AI and Machine Learning
8086
items:
8187
- name: Deploy an AI model with the AI toolchain operator
@@ -85,9 +91,9 @@
8591
- name: Enable Microsoft Entra ID authentication for Kubernetes clusters
8692
href: enable-authentication-microsoft-entra-id.md
8793
- name: Use Azure RBAC for Kubernetes authorization
88-
href: azure-rbac-23h2.md
94+
href: azure-rbac-local.md
8995
- name: Use Kubernetes RBAC with Microsoft Entra ID
90-
href: kubernetes-rbac-23h2.md
96+
href: kubernetes-rbac-local.md
9197
- name: Retrieve certificate-based admin kubeconfig
9298
href: retrieve-admin-kubeconfig.md
9399
- name: Configure SSH keys for a cluster
@@ -278,6 +284,8 @@
278284
items:
279285
- name: AKS Edge Essentials PowerShell
280286
href: ./reference/aks-edge-ps/index.md
287+
- name: Get support
288+
href: aks-edge-help-support.md
281289
- name: Troubleshooting
282290
href: aks-edge-troubleshoot-overview.md
283291
- name: Logs
@@ -358,23 +366,6 @@
358366
href: setup.md
359367
- name: Create a Kubernetes cluster
360368
href: create-kubernetes-cluster.md
361-
- name: Tutorial
362-
items:
363-
- name: 1 - Prepare an application
364-
href: tutorial-kubernetes-prepare-application.md
365-
- name: 2 - Create container registry
366-
href: tutorial-kubernetes-prepare-azure-container-registry.md
367-
- name: 3 - Deploy a workload cluster
368-
href: tutorial-kubernetes-deploy-cluster.md
369-
- name: 4 - Run an application
370-
href: tutorial-kubernetes-deploy-application.md
371-
- name: 5 - Scale an application
372-
href: tutorial-kubernetes-scale.md
373-
- name: 6 - Update an application
374-
href: tutorial-kubernetes-app-update.md
375-
- name: 7 - Upgrade Kubernetes cluster
376-
# Remove this, we don tneed to upgrade K8s in this tutorial.
377-
href: tutorial-kubernetes-upgrade-cluster.md
378369
- name: Concepts
379370
items:
380371
- name: Quotas and resource limits
@@ -554,7 +545,7 @@
554545
- name: Use OpenFaaS
555546
href: openfaas.md
556547
- name: Use Bridge to Kubernetes with Visual Studio Code
557-
href: https://code.visualstudio.com/docs/containers/bridge-to-kubernetes
548+
href: /visualstudio/bridge/bridge-to-kubernetes-vs-code
558549
- name: Use Bridge to Kubernetes with Visual Studio
559550
href: /visualstudio/containers/bridge-to-kubernetes
560551
- name: Deploy a Java application with Open Liberty or WebSphere Liberty
@@ -573,7 +564,7 @@
573564
href: aks-hybrid-preview-uninstall.md
574565
- name: Troubleshooting overview
575566
href: troubleshoot-overview.md
576-
- name: Azure Arc enabled Kubernetes
567+
- name: Azure Arc-enabled Kubernetes
577568
href: known-issues-arc.yml
578569
- name: Pre-installation validation tests
579570
href: validation-tests.md
@@ -599,12 +590,6 @@
599590
href: known-issues-uninstall.yml
600591
- name: Other
601592
href: known-issues.yml
602-
- name: Azure Local issues
603-
items:
604-
- name: Cluster validation reporting in Azure Local
605-
href: /azure-stack/hci/manage/validate-qos
606-
- name: CredSSP in Azure Local
607-
href: /azure-stack/hci/manage/troubleshoot-credssp
608593
- name: Support policies
609594
href: support-policies.md
610595
- name: Get support

AKS-Arc/ad-sso.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,31 @@
11
---
2-
title: Use Active Directory single sign-on for secure connection to Kubernetes API server in AKS enabled by Azure Arc
2+
title: Use Active Directory single sign-on for secure connection to Kubernetes API server in AKS on Windows Server
33
description: Use Active Directory Authentication to securely connect to the API server with SSO credentials
44
author: sethmanheim
55
ms.topic: how-to
6-
ms.date: 08/07/2024
6+
ms.date: 04/02/2025
77
ms.author: sethm
88
ms.lastreviewed: 1/14/2022
9-
ms.reviewer: sulahiri
9+
ms.reviewer: leslielin
1010

1111
# Intent: As an IT Pro, I want to ue Active Directory Authentication to securely connect to the Kubernetes API server with SSO credentials.
1212
# Keyword: secure connection to Kubernetes API server
1313

1414
---
1515

16-
# Use Active Directory single sign-on for secure connection to Kubernetes API server in AKS enabled by Azure Arc
16+
# Use Active Directory single sign-on for secure connection to Kubernetes API server in AKS on Windows Server
1717

1818
[!INCLUDE [applies-to-azure stack-hci-and-windows-server-skus](includes/aks-hci-applies-to-skus/aks-hybrid-applies-to-azure-stack-hci-windows-server-sku.md)]
1919

20-
You can create a secure connection to your Kubernetes API server in AKS enabled by Arc using Active Directory (AD) single sign-on (SSO) credentials.
20+
You can create a secure connection to your Kubernetes API server in AKS on Windows Server using Active Directory (AD) single sign-on (SSO) credentials.
2121

22-
## Overview of AD in AKS enabled by Arc
22+
## Overview of AD in AKS on Windows Server
2323

24-
Without Active Directory authentication, you must rely on a certificate-based _kubeconfig_ file when you connect to the API server via the `kubectl` command. The **kubeconfig** file contains secrets such as private keys and certificates that need to be carefully distributed, which can be a significant security risk.
24+
Without Active Directory authentication, you must rely on a certificate-based *kubeconfig* file when you connect to the API server via the `kubectl` command. The **kubeconfig** file contains secrets such as private keys and certificates that need to be carefully distributed, which can be a significant security risk.
2525

26-
As an alternative to using certificate-based kubeconfig, you can use AD SSO credentials as a secure way to connect to the API server. AD integration with AKS Arc lets users on a Windows domain-joined machine connect to the API server via `kubectl` using their SSO credentials. This removes the need to manage and distribute certificate-based kubeconfig files that contain private keys.
26+
As an alternative to using certificate-based **kubeconfig**, you can use AD SSO credentials as a secure way to connect to the API server. AD integration with AKS Arc lets users on a Windows domain-joined machine connect to the API server via `kubectl` using their SSO credentials. This removes the need to manage and distribute certificate-based **kubeconfig** files that contain private keys.
2727

28-
AD integration uses AD kubeconfig, which is distinct from the certificate-based kubeconfig files and doesn't contain any secrets. However, the certificate-based kubeconfig file can be used for backup purposes, such as troubleshooting, if there are issues with connecting using Active Directory credentials.
28+
AD integration uses AD **kubeconfig**, which is distinct from the certificate-based **kubeconfig** files and doesn't contain any secrets. However, the certificate-based **kubeconfig** file can be used for backup purposes, such as troubleshooting, if there are issues with connecting using Active Directory credentials.
2929

3030
Another security benefit with AD integration is that the users and groups are stored as [security identifiers (SIDs)](/troubleshoot/windows-server/identity/security-identifiers-in-windows). Unlike group names, SIDs are immutable and unique and therefore present no naming conflicts.
3131

@@ -77,7 +77,7 @@ Before you can install AD authentication, the workload cluster must be installed
7777

7878
#### Option 1
7979

80-
For a domain-joined Azure Local or Windows Server cluster, open PowerShell as an administrator and run the following command:
80+
For a domain-joined Windows Server cluster, open PowerShell as an administrator and run the following command:
8181

8282
```powershell
8383
Install-AksHciAdAuth -name mynewcluster1 -keytab .\current.keytab -SPN k8s/[email protected] -adminUser contoso\bob

AKS-Arc/adapt-apps-mixed-os-clusters.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Adapt applications for use in mixed-OS Kubernetes clusters
3-
description: Learn how to use node selectors or taints and tolerations on Azure Kubernetes Service to ensure applications in mixed OS Kubernetes clusters running on AKS Arc are scheduled on the correct worker node operating system.
3+
description: Learn how to use node selectors or taints and tolerations on Azure Kubernetes Service to ensure applications in mixed OS Kubernetes clusters running on AKS on Windows Server are scheduled on the correct worker node operating system.
44
author: sethmanheim
55
ms.topic: how-to
66
ms.date: 06/27/2024
@@ -16,9 +16,9 @@ ms.reviewer: abha
1616

1717
[!INCLUDE [applies-to-azure stack-hci-and-windows-server-skus](includes/aks-hci-applies-to-skus/aks-hybrid-applies-to-azure-stack-hci-windows-server-sku.md)]
1818

19-
AKS enabled by Arc enables you to run Kubernetes clusters with both Linux and Windows nodes, but you must make small edits to your apps for use in these mixed-OS clusters. This how-to guide describes how to ensure your application gets scheduled on the right host OS using either node selectors or taints and tolerations.
19+
AKS on Windows Server enables you to run Kubernetes clusters with both Linux and Windows nodes, but you must make small edits to your apps for use in these mixed-OS clusters. This how-to guide describes how to ensure your application gets scheduled on the right host OS using either node selectors or taints and tolerations.
2020

21-
This article assumes a basic understanding of Kubernetes concepts. For more information, see [Kubernetes core concepts for AKS enabled by Arc](kubernetes-concepts.md).
21+
This article assumes a basic understanding of Kubernetes concepts. For more information, see [Kubernetes core concepts for AKS on Windows Server](kubernetes-concepts.md).
2222

2323
## Node selectors
2424

AKS-Arc/add-ons.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Add-ons and extensions available for AKS enabled by Arc
3-
description: Learn about what add-ons and integrations are supported in AKS enabled by Azure Arc.
2+
title: Add-ons and extensions available for AKS on Windows Server
3+
description: Learn about what add-ons and integrations are supported in AKS on Windows Server.
44
author: sethmanheim
55
ms.topic: how-to
66
ms.date: 02/15/2024
@@ -9,9 +9,9 @@ ms.lastreviewed: 02/15/2023
99
ms.reviewer: baziwane
1010
---
1111

12-
# Add-ons, extensions, and other integrations with AKS enabled by Arc
12+
# Add-ons, extensions, and other integrations with AKS on Windows Server
1313

14-
Azure Kubernetes Service (AKS) enabled by Azure Arc provides augmented functionality for your Kubernetes cluster, mainly through extensions that are supported by Microsoft. There are also many integrations offered by open-source projects and third-party organizations. It's important to note that these integrations, which are not supported by AKS Arc, are not included in the [AKS Arc support policy](support-policies.md).
14+
Azure Kubernetes Service (AKS) on Windows Server provides augmented functionality for your Kubernetes cluster, mainly through extensions that are supported by Microsoft. There are also many integrations offered by open-source projects and third-party organizations. It's important to note that these integrations, which are not supported by AKS Arc, are not included in the [AKS Arc support policy](support-policies.md).
1515

1616
## Add-ons
1717

@@ -30,15 +30,15 @@ The following rules are used by AKS Arc for applying updates to installed add-on
3030
| [Install-AksHciCsiNfs](reference/ps/install-akshcicsinfs.md) | Installs the CSI NFS plug-in to a cluster. |
3131
| [Install-AksHciCsiSmb](reference/ps/install-akshcicsismb.md) | Installs the CSI SMB plug-in to a cluster. |
3232
| [Install-AksHciGmsaWebhook](reference/ps/install-akshcigmsawebhook.md) | Installs gMSA webhook add-on to the cluster. |
33-
| [Install-AksHciMonitoring](reference/ps/install-akshcimonitoring.md) | Installs Prometheus for monitoring in the AKS enabled by Arc deployment. |
33+
| [Install-AksHciMonitoring](reference/ps/install-akshcimonitoring.md) | Installs Prometheus for monitoring in the AKS on Windows Server deployment. |
3434

3535
## Azure Arc extensions
3636

3737
Cluster extensions build on top of certain Helm charts and provide an Azure Resource Manager-driven experience for installation and lifecycle management of different Azure capabilities on top of your Kubernetes cluster. You can [deploy these extensions to your clusters](/azure/azure-arc/kubernetes/extensions) to improve cluster management.
3838

3939
### Available extensions
4040

41-
For more information about the specific cluster extensions for AKS enabled by Arc, see [Currently available extensions](/azure/azure-arc/kubernetes/extensions-release).
41+
For more information about the specific cluster extensions for AKS on Windows Server, see [Currently available extensions](/azure/azure-arc/kubernetes/extensions-release).
4242

4343
## Difference between extensions and add-ons
4444

@@ -58,4 +58,4 @@ The following table shows examples of open-source and third-party integrations:
5858

5959
## Next steps
6060

61-
- [AKS enabled by Arc overview](aks-overview.md)
61+
- [AKS on Windows Server overview](overview.md)

AKS-Arc/aks-arc-use-node-taints.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,7 @@
11
---
22
title: Manage node taints for an AKS cluster
3-
description: Learn how to manage node taints in AKS on Azure Local, version 23H2
3+
description: Learn how to manage node taints in AKS on Azure Local
44
ms.topic: how-to
5-
ms.custom:
65
ms.date: 06/03/2024
76
author: sethmanheim
87
ms.author: sethm

AKS-Arc/aks-create-clusters-cli.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.reviewer: guanghu
1616

1717
This article describes how to create Kubernetes clusters in Azure Local using Azure CLI. The workflow is as follows:
1818

19-
1. Create a Kubernetes cluster in Azure Local, version 23H2 using Azure CLI. The cluster is Azure Arc-connected by default.
19+
1. Create a Kubernetes cluster in Azure Local using Azure CLI. The cluster is Azure Arc-connected by default.
2020
1. While creating the cluster, you provide a Microsoft Entra group that contains the list of Microsoft Entra users with Kubernetes cluster administrator access.
2121
1. Access the cluster using kubectl and your Microsoft Entra ID.
2222
1. Run a sample multi-container application with a web front end and a Redis instance in the cluster.
@@ -44,7 +44,7 @@ az extension add -n connectedk8s --upgrade
4444

4545
## Create a Kubernetes cluster
4646

47-
Use the [`az aksarc create`](/cli/azure/aksarc#az-aksarc-create) command to create a Kubernetes cluster in AKS Arc. Make sure you sign in to Azure before you run this command. If you have multiple Azure subscriptions, select the appropriate subscription ID using the [`az account set`](/cli/azure/account#az-account-set) command. With the `az aksarc create` command, we recommend that you use the `--validate` flag, which validates the input parameters that you intend to use. Once the input parameters are validated, you can run the `az aksarc create` command without the `--validate` flag to create the Kubernetes cluster.
47+
Use the [az aksarc create](/cli/azure/aksarc#az-aksarc-create) command to create a Kubernetes cluster in AKS Arc. Make sure you sign in to Azure before you run this command. If you have multiple Azure subscriptions, select the appropriate subscription ID using the [az account set](/cli/azure/account#az-account-set) command. With the `az aksarc create` command, we recommend that you use the `--validate` flag, which validates the input parameters that you intend to use. Once the input parameters are validated, you can run the `az aksarc create` command without the `--validate` flag to create the Kubernetes cluster.
4848

4949
```azurecli
5050
az aksarc create -n $aksclustername -g $resource_group --custom-location $customlocationID --vnet-ids $logicnetId --aad-admin-group-object-ids $aadgroupID --generate-ssh-keys
@@ -62,7 +62,7 @@ Note the following considerations when you create a cluster:
6262
- By default, the SSH key is stored at **~/.ssh/id_rsa.pub**. During cluster creation, you can specify an alternate location using the `--ssh-key-value` parameter.
6363

6464
> [!IMPORTANT]
65-
> To use Azure RBAC or workload identity for an AKS cluster, you must pass the required parameters during cluster creation using Azure CLI. Currently, updating an existing AKS cluster to enable workload identity and/or Azure RBAC is not supported. For more information, see [Use Azure RBAC for Kubernetes authorization](/azure/aks/hybrid/azure-rbac-23h2) or [Deploy and configure Workload Identity for your cluster](workload-identity.md).
65+
> To use Azure RBAC or workload identity for an AKS cluster, you must pass the required parameters during cluster creation using Azure CLI. Currently, updating an existing AKS cluster to enable workload identity and/or Azure RBAC is not supported. For more information, see [Use Azure RBAC for Kubernetes authorization](azure-rbac-local.md) or [Deploy and configure Workload Identity for your cluster](workload-identity.md).
6666
6767
## Connect to the Kubernetes cluster
6868

AKS-Arc/aks-create-clusters-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -82,5 +82,5 @@ This article describes how to create Kubernetes clusters in Azure Local using th
8282

8383
## Next steps
8484

85-
- [Review AKS on Azure Local, version 23H2 prerequisites](aks-hci-network-system-requirements.md)
86-
- [What's new in AKS on Azure Local](aks-whats-new-23h2.md)
85+
- [Review AKS on Azure Local prerequisites](aks-hci-network-system-requirements.md)
86+
- [What's new in AKS on Azure Local](aks-whats-new-local.md)

0 commit comments

Comments
 (0)