Skip to content

Commit be7a715

Browse files
committed
Remove version from Azure Local refs
1 parent 3285019 commit be7a715

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

44 files changed

+148
-135
lines changed

.openpublishing.redirection.aks.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1439,6 +1439,21 @@
14391439
"source_path": "AKS-Arc/aks-known-issues.md",
14401440
"redirect_url": "/azure/aks/aksarc/aks-troubleshoot",
14411441
"redirect_document_id": false
1442+
},
1443+
{
1444+
"source_path": "AKS-Arc/aks-whats-new-23h2.md",
1445+
"redirect_url": "/azure/aks/aksarc/aks-whats-new-local",
1446+
"redirect_document_id": false
1447+
},
1448+
{
1449+
"source_path": "AKS-Arc/azure-rbac-23h2.md",
1450+
"redirect_url": "/azure/aks/aksarc/azure-rbac-local",
1451+
"redirect_document_id": false
1452+
},
1453+
{
1454+
"source_path": "AKS-Arc/kubernetes-rbac-23h2.md",
1455+
"redirect_url": "/azure/aks/aksarc/kubernetes-rbac-local",
1456+
"redirect_document_id": false
14421457
}
14431458
]
14441459
}

AKS-Arc/TOC.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -11,11 +11,11 @@
1111
href: data-collection.md
1212
- name: Blogs and announcements
1313
href: blogs-announcements.md
14-
- name: AKS on Azure Local, version 23H2
14+
- name: AKS on Azure Local
1515
expanded: true
1616
items:
17-
- name: What's new in AKS on Azure Local, version 23H2
18-
href: aks-whats-new-23h2.md
17+
- name: What's new in AKS on Azure Local
18+
href: aks-whats-new-local.md
1919
- name: Concepts
2020
items:
2121
- name: Architecture
@@ -85,9 +85,9 @@
8585
- name: Enable Microsoft Entra ID authentication for Kubernetes clusters
8686
href: enable-authentication-microsoft-entra-id.md
8787
- name: Use Azure RBAC for Kubernetes authorization
88-
href: azure-rbac-23h2.md
88+
href: azure-rbac-local.md
8989
- name: Use Kubernetes RBAC with Microsoft Entra ID
90-
href: kubernetes-rbac-23h2.md
90+
href: kubernetes-rbac-local.md
9191
- name: Retrieve certificate-based admin kubeconfig
9292
href: retrieve-admin-kubeconfig.md
9393
- name: Configure SSH keys for a cluster

AKS-Arc/aks-arc-use-node-taints.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,7 @@
11
---
22
title: Manage node taints for an AKS cluster
3-
description: Learn how to manage node taints in AKS on Azure Local, version 23H2
3+
description: Learn how to manage node taints in AKS on Azure Local
44
ms.topic: how-to
5-
ms.custom:
65
ms.date: 06/03/2024
76
author: sethmanheim
87
ms.author: sethm

AKS-Arc/aks-create-clusters-cli.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.reviewer: guanghu
1616

1717
This article describes how to create Kubernetes clusters in Azure Local using Azure CLI. The workflow is as follows:
1818

19-
1. Create a Kubernetes cluster in Azure Local, version 23H2 using Azure CLI. The cluster is Azure Arc-connected by default.
19+
1. Create a Kubernetes cluster in Azure Local using Azure CLI. The cluster is Azure Arc-connected by default.
2020
1. While creating the cluster, you provide a Microsoft Entra group that contains the list of Microsoft Entra users with Kubernetes cluster administrator access.
2121
1. Access the cluster using kubectl and your Microsoft Entra ID.
2222
1. Run a sample multi-container application with a web front end and a Redis instance in the cluster.
@@ -62,7 +62,7 @@ Note the following considerations when you create a cluster:
6262
- By default, the SSH key is stored at **~/.ssh/id_rsa.pub**. During cluster creation, you can specify an alternate location using the `--ssh-key-value` parameter.
6363

6464
> [!IMPORTANT]
65-
> To use Azure RBAC or workload identity for an AKS cluster, you must pass the required parameters during cluster creation using Azure CLI. Currently, updating an existing AKS cluster to enable workload identity and/or Azure RBAC is not supported. For more information, see [Use Azure RBAC for Kubernetes authorization](/azure/aks/hybrid/azure-rbac-23h2) or [Deploy and configure Workload Identity for your cluster](workload-identity.md).
65+
> To use Azure RBAC or workload identity for an AKS cluster, you must pass the required parameters during cluster creation using Azure CLI. Currently, updating an existing AKS cluster to enable workload identity and/or Azure RBAC is not supported. For more information, see [Use Azure RBAC for Kubernetes authorization](/azure/aks/hybrid/azure-rbac-local) or [Deploy and configure Workload Identity for your cluster](workload-identity.md).
6666
6767
## Connect to the Kubernetes cluster
6868

AKS-Arc/aks-create-clusters-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -82,5 +82,5 @@ This article describes how to create Kubernetes clusters in Azure Local using th
8282

8383
## Next steps
8484

85-
- [Review AKS on Azure Local, version 23H2 prerequisites](aks-hci-network-system-requirements.md)
86-
- [What's new in AKS on Azure Local](aks-whats-new-23h2.md)
85+
- [Review AKS on Azure Local prerequisites](aks-hci-network-system-requirements.md)
86+
- [What's new in AKS on Azure Local](aks-whats-new-local.md)

AKS-Arc/aks-hci-ip-address-planning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,4 +111,4 @@ AKS provides a **default value of 10.96.0.0/12** for the service network CIDR. A
111111

112112
## Next steps
113113

114-
[Create logical networks for Kubernetes clusters on Azure Local, version 23H2](aks-networks.md)
114+
[Create logical networks for Kubernetes clusters on Azure Local](aks-networks.md)

AKS-Arc/aks-hci-network-system-requirements.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -22,15 +22,15 @@ In this conceptual article, the following key components are introduced. These c
2222

2323
## Logical networks for AKS Arc VMs and control plane IP
2424

25-
Kubernetes nodes are deployed as specialized virtual machines in AKS enabled by Arc. These VMs are allocated IP addresses to enable communication between Kubernetes nodes. AKS Arc uses Azure Local logical networks to provide IP addresses and networking for the underlying VMs of the Kubernetes clusters. For more information about logical networks, see [Logical networks for Azure Local](/azure-stack/hci/manage/create-logical-networks?tabs=azurecli). You must plan to reserve one IP address per AKS cluster node VM in your Azure Local environment.
25+
Kubernetes nodes are deployed as specialized virtual machines in AKS enabled by Arc. These VMs are allocated IP addresses to enable communication between Kubernetes nodes. AKS Arc uses Azure Local logical networks to provide IP addresses and networking for the underlying VMs of the Kubernetes clusters. For more information about logical networks, see [Logical networks for Azure Local](/azure/azure-local/manage/create-logical-networks?tabs=azurecli). You must plan to reserve one IP address per AKS cluster node VM in your Azure Local environment.
2626

2727
> [!NOTE]
28-
> Static IP is the only supported mode for assigning an IP address to AKS Arc VMs. This is because Kubernetes requires the IP address assigned to a Kubernetes node to be constant throughout the lifecycle of the Kubernetes cluster.
29-
> Software defined virtual networks and SDN related features are currently not supported on AKS on Azure Local, version 23H2.
28+
> Static IP is the only supported mode for assigning an IP address to AKS Arc VMs. This is because Kubernetes requires the IP address assigned to a Kubernetes node to be constant throughout the lifecycle of the Kubernetes cluster.
29+
> Software defined virtual networks and SDN related features are currently not supported on AKS on Azure Local.
3030
3131
The following parameters are required in order to use a logical network for AKS Arc cluster create operation:
3232

33-
| [Az CLI logical networks parameter](/azure-stack/hci/manage/create-logical-networks?tabs=azurecli) | Description| Required parameter for AKS Arc cluster|
33+
| [Az CLI logical networks parameter](/azure/azure-local/manage/create-logical-networks?tabs=azurecli) | Description| Required parameter for AKS Arc cluster|
3434
|------------------|---------|-----------|
3535
| `--address-prefixes` | AddressPrefix for the network. Currently only 1 address prefix is supported. Usage: `--address-prefixes "10.220.32.16/24"`. | ![Supported](media/aks-hybrid-networks/check.png) |
3636
| `--dns-servers` | Space-separated list of DNS server IP addresses. Usage: `--dns-servers 10.220.32.16 10.220.32.17`. | ![Supported](media/aks-hybrid-networks/check.png) |
@@ -62,19 +62,19 @@ Regardless of the option you choose, you must ensure that the IP addresses alloc
6262

6363
## Proxy settings
6464

65-
Proxy settings in AKS are inherited from the underlying infrastructure system. The functionality to set individual proxy settings for Kubernetes clusters and change proxy settings isn't supported yet. For more information on how to set proxy correctly, see [proxy requirements for Azure Local](/azure-stack/hci/manage/configure-proxy-settings-23h2).
65+
Proxy settings in AKS are inherited from the underlying infrastructure system. The functionality to set individual proxy settings for Kubernetes clusters and change proxy settings isn't supported yet. For more information on how to set proxy correctly, see [proxy requirements for Azure Local](/azure/azure-local/manage/configure-proxy-settings-23h2).
6666

6767
## Firewall URL exceptions
6868

69-
Firewall requirements for AKS have been consolidated with Azure Local firewall requirements. See [Azure Local firewall requirements](/azure-stack/hci/concepts/firewall-requirements) for list of URLs that need to be allowed to successfully deploy AKS.
69+
Firewall requirements for AKS have been consolidated with Azure Local firewall requirements. See [Azure Local firewall requirements](/azure/azure-local/concepts/firewall-requirements) for list of URLs that need to be allowed to successfully deploy AKS.
7070

7171
## DNS server settings
7272

7373
You need to ensure that the DNS server of the logical network can resolve the FQDN of the Azure Local cluster. DNS name resolution is required for all Azure Local nodes to be able to communicate with the AKS VM nodes.
7474

7575
## Network port and cross-VLAN requirements
7676

77-
When you deploy Azure Local, you allocate a contiguous block of at least [six static IP addresses on your management network's subnet](/azure-stack/hci/deploy/deploy-via-portal#specify-network-settings), omitting addresses already used by the physical machines. These IPs are used by Azure Local and internal infrastructure (Arc Resource Bridge) for Arc VM management and AKS Arc. If your management network that provides IP addresses to Arc Resource Bridge related Azure Local services are on a different VLAN than the logical network you used to create AKS clusters, you need to ensure that the following ports are opened to successfully create and operate an AKS cluster.
77+
When you deploy Azure Local, you allocate a contiguous block of at least [six static IP addresses on your management network's subnet](/azure/azure-local/deploy/deploy-via-portal#specify-network-settings), omitting addresses already used by the physical machines. These IPs are used by Azure Local and internal infrastructure (Arc Resource Bridge) for Arc VM management and AKS Arc. If your management network that provides IP addresses to Arc Resource Bridge related Azure Local services are on a different VLAN than the logical network you used to create AKS clusters, you need to ensure that the following ports are opened to successfully create and operate an AKS cluster.
7878

7979
| Destination Port | Destination | Source | Description | Bi-directional cross VLAN networking notes |
8080
|------------------|-------------|--------|-------------|----------------|
@@ -84,4 +84,5 @@ When you deploy Azure Local, you allocate a contiguous block of at least [six st
8484
| 65000 | IP addresses in management network | Logical network used for AKS Arc VMs | Cloud Agent gRPC authentication | If you use separate VLANs, the AKS Arc VMs need to access the IP addresses in management network used for cloud agent IP and cluster IP on this port and vice-versa. |
8585

8686
## Next steps
87+
8788
[IP address planning and considerations for Kubernetes clusters and applications](aks-hci-ip-address-planning.md)

AKS-Arc/aks-hybrid-preview-uninstall.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.lastreviewed: 01/30/2024
1414

1515
[!INCLUDE [aks-hybrid-applies-to-azure-stack-hci-windows-server-sku](includes/aks-hci-applies-to-skus/aks-hybrid-applies-to-azure-stack-hci-windows-server-sku.md)]
1616

17-
This step is only required if you installed the AKS cluster provisioning from Azure preview. The preview ended with the release of [AKS enabled by Azure Arc on Azure Local version 23H2](aks-overview.md). This article describes the steps to uninstall the preview bits before upgrading to AKS Arc.
17+
This step is only required if you installed the AKS cluster provisioning from Azure preview. The preview ended with the release of [AKS enabled by Azure Arc on Azure Local](aks-overview.md). This article describes the steps to uninstall the preview bits before upgrading to AKS Arc.
1818

1919
## Step 1: delete all preview AKS clusters and Azure vnets created using Az CLI
2020

AKS-Arc/aks-monitor-logging.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.reviewer: guanghu
1515

1616
# Monitor and log data
1717

18-
[!INCLUDE [applies-to-azure stack-hci-and-windows-server-skus](includes/aks-hci-applies-to-skus/aks-hybrid-applies-to-azure-stack-hci-windows-server-sku.md)], Azure Local, version 23H2, AKS enabled by Azure Arc on VMware (preview)
18+
[!INCLUDE [applies-to-azure stack-hci-and-windows-server-skus](includes/aks-hci-applies-to-skus/aks-hybrid-applies-to-azure-stack-hci-windows-server-sku.md)], Azure Local, AKS enabled by Azure Arc on VMware (preview)
1919

2020
This article describes how to monitor your AKS enabled by Azure Arc deployment using on-premises monitoring. Two types of monitoring and logging solutions are available, as described in the following table:
2121

@@ -53,7 +53,7 @@ The objects and endpoints that the Prometheus solution scrapes include the follo
5353

5454
Prometheus is an open-source monitoring system with a dimensional data model, flexible query language, efficient time series database and modern alerting approach. Grafana is a tool used to view, query, and visualize metrics on the Grafana dashboards. It can be configured to use Prometheus as the data source. Usually, they are used together for Kubernetes cluster monitoring.
5555

56-
To view the Grafana dashboards available in AKS enabled by Arc, see [Grafana dashboards available in AKS](https://github.com/microsoft/AKS-HCI-Apps/blob/main/Monitoring/Grafana.md#grafana-dashboards-available-in-aks-hci).
56+
To view the Grafana dashboards available in AKS enabled by Arc, see [Grafana dashboards available in AKS](https://github.com/microsoft/AKS-Arc-Apps/blob/main/Monitoring/Grafana.md#grafana-dashboards-available-in-aks-hci).
5757

5858
You can view Microsoft's deployment [guidance on GitHub](https://github.com/microsoft/AKS-Arc-Apps/tree/main/Monitoring) to deploy Prometheus on your Kubernetes cluster and configure Grafana to use Prometheus as data source. You can also follow any publicly available documentation to deploy any specific version of Prometheus or Grafana.
5959

AKS-Arc/aks-networks.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Create logical networks for Kubernetes clusters on Azure Local, version 23H2
3-
description: Learn how to create Arc-enabled logical networks for AKS.
2+
title: Create logical networks for Kubernetes clusters on Azure Local
3+
description: Learn how to create Arc-enabled logical networks for AKS enabled by Azure Arc.
44
ms.topic: how-to
55
author: sethmanheim
66
ms.date: 04/01/2025
@@ -9,18 +9,18 @@ ms.lastreviewed: 04/01/2024
99
ms.reviewer: abha
1010
---
1111

12-
# Create logical networks for Kubernetes clusters on Azure Local, version 23H2
12+
# Create logical networks for Kubernetes clusters on Azure Local
1313

1414
[!INCLUDE [hci-applies-to-23h2](includes/hci-applies-to-23h2.md)]
1515

16-
After you install and configure Azure Local, version 23H2, you must create Arc VM logical networks. AKS on Azure Local uses static logical networks to provide IP addresses to the underlying VMs of the AKS clusters.
16+
After you install and configure Azure Local, you must create Arc VM logical networks. AKS on Azure Local uses static logical networks to provide IP addresses to the underlying VMs of the AKS clusters.
1717

1818
## Before you begin
1919

2020
Before you begin, make sure you have the following prerequisites:
2121

22-
- Install and configure Azure Local, version 23H2. Make sure you have the custom location Azure Resource Manager ID, as this ID is a required parameter for creating a logical network.
23-
- Make sure that the logical network you create contains enough usable IP addresses to avoid IP address exhaustion. IP address exhaustion can lead to Kubernetes cluster deployment failures. For more information, see [Networking concepts in AKS on Azure Local, version 23H2](aks-hci-network-system-requirements.md).
22+
- Install and configure Azure Local. Make sure you have the custom location Azure Resource Manager ID, as this ID is a required parameter for creating a logical network.
23+
- Make sure that the logical network you create contains enough usable IP addresses to avoid IP address exhaustion. IP address exhaustion can lead to Kubernetes cluster deployment failures. For more information, see [Networking concepts in AKS on Azure Local](aks-hci-network-system-requirements.md).
2424
- Make sure you have an external VM switch that can be accessed by all the machines in your Azure Local cluster. By default, an external switch is created during the deployment of your Azure Local cluster that you can use to associate with the logical network you will create.
2525

2626
Run the following command to get the name of the external VM switch on your Azure Local cluster:

0 commit comments

Comments
 (0)