You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: 01-prerequisites.md
+2-5
Original file line number
Diff line number
Diff line change
@@ -30,19 +30,16 @@ This is the starting point for the instructions on deploying the [AKS baseline r
30
30
31
31
1. While the following feature(s) are still in _preview_, please enable them in your target subscription.
32
32
33
-
1.[Register the Defender for Containers preview feature = `AKS-AzureDefender`](https://learn.microsoft.com/azure/defender-for-cloud/defender-for-containers-enable?pivots=defender-for-container-aks&tabs=k8s-deploy-cli%2Ck8s-deploy-asc%2Ck8s-verify-asc%2Ck8s-remove-arc%2Caks-removeprofile-api#deploy-the-defender-profile)
34
-
35
33
1.[Register the Workload Identity preview feature = `EnableWorkloadIdentityPreview`](https://learn.microsoft.com/azure/aks/workload-identity-deploy-cluster#register-the-enableworkloadidentitypreview-feature-flag)
36
34
37
-
1. Register the ImageCleaner (Earser) preview feature = `EnableImageCleanerPreview`](https://learn.microsoft.com/azure/aks/image-cleaner#prerequisites)
35
+
1.[Register the ImageCleaner (Earser) preview feature = `EnableImageCleanerPreview`](https://learn.microsoft.com/azure/aks/image-cleaner#prerequisites)
38
36
39
37
```bash
40
-
az feature register --namespace "Microsoft.ContainerService" -n "AKS-AzureDefender"
41
38
az feature register --namespace "Microsoft.ContainerService" -n "EnableWorkloadIdentityPreview"
42
39
az feature register --namespace "Microsoft.ContainerService" -n "EnableImageCleanerPreview"
43
40
44
41
# Keep running until all say "Registered." (This may take up to 20 minutes.)
45
-
az feature list -o table --query "[?name=='Microsoft.ContainerService/AKS-AzureDefender' || name=='Microsoft.ContainerService/EnableWorkloadIdentityPreview' || name=='Microsoft.ContainerService/EnableImageCleanerPreview'].{Name:name,State:properties.state}"
42
+
az feature list -o table --query "[?name=='Microsoft.ContainerService/EnableWorkloadIdentityPreview' || name=='Microsoft.ContainerService/EnableImageCleanerPreview'].{Name:name,State:properties.state}"
46
43
47
44
# When all say "Registered" then re-register the AKS resource provider
48
45
az provider register --namespace Microsoft.ContainerService
Copy file name to clipboardexpand all lines: 03-aad.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ This does not configure anything related to workload identity. This configuratio
29
29
30
30
1. Playing the role as the Contoso Bicycle Azure AD team, login into the tenant where Kubernetes Cluster API authorization will be associated with.
31
31
32
-
> :bulb: Skip the `az login` command if you plan to use your current user account's Azure AD tenant for Kubernetes authorization.
32
+
> :bulb: Skip the `az login` command if you plan to use your current user account's Azure AD tenant for Kubernetes authorization._Using the same tenant is common._
33
33
34
34
```bash
35
35
az login -t <Replace-With-ClusterApi-AzureAD-TenantId> --allow-no-subscriptions
Copy file name to clipboardexpand all lines: 04-networking.md
+6
Original file line number
Diff line number
Diff line change
@@ -104,6 +104,12 @@ The following two resource groups will be created and populated with networking
104
104
>
105
105
> Hubs and spokes are controlled by the networking team's GitHub Actions workflows. This automation is not included in this reference implementation as this body of work is focused on the AKS baseline and not the networking team's CI/CD practices.
106
106
107
+
## Private DNS Zones
108
+
109
+
Private DNS zones in this reference implementation are implemented directly at the spoke level, meaning the workload team creates the private link DNS zones & records for the resources needed; furthermore, the workload is directly using Azure DNS for resolution. Your networking topology might support this decentralized model or instead DNS & DNS zones for Private Link might be handed at the regional hub or in a [VWAN virtual hub extension](https://learn.microsoft.com/azure/architecture/guide/networking/private-link-vwan-dns-virtual-hub-extension-pattern) by your networking team.
110
+
111
+
If your organization operate a centeralized DNS model, you'll need to adapt how DNS zones records are managed this implementation into your existing enteprise networking DNS zone strategy. Since this reference implementation is expected to be deployed isolated from existing infrastructure; this is not something you need to address now; but will be something to understand and address when taking your solution to production.
112
+
107
113
### Next step
108
114
109
115
:arrow_forward:[Prep for cluster bootstrapping](./05-bootstrap-prep.md)
Copy file name to clipboardexpand all lines: 05-bootstrap-prep.md
+5-2
Original file line number
Diff line number
Diff line change
@@ -12,10 +12,13 @@ Container registries often have a lifecycle that extends beyond the scope of a s
12
12
13
13
The role of this pre-existing ACR instance is made more prominant when we think about cluster bootstrapping. That is the process that happens after Azure resource deployment of the cluster, but before your first workload lands in the cluster. The cluster will be bootstrapped _immedately and automatically_ after resource deployment, which means you'll need ACR in place to act as your official OCI artifact repository for required images and Helm charts used in that bootstrapping process.
14
14
15
-
### Method
15
+
### Bootstrapping method
16
16
17
17
We'll be bootstrapping this cluster with the Flux GitOps agent as installed as an AKS extension. This specific choice does not imply that Flux, or GitOps in general, is the only approach to bootstrapping. Consider your organizational familiarity and acceptance of tooling like this and decide if cluster bootstrapping should be performed with GitOps or via your deployment pipelines. If you are running a fleet of clusters, a GitOps approach is highly recommended for uniformity and easier governance. When running only a few clusters, GitOps might be seen as "too much" and you might instead opt for integrating that process into one or more deployment pipelines to ensure bootstrapping takes place. No matter which way you go, you'll need your bootstrapping artifacts ready to go before you start your cluster deployment so that you can minimize the time between cluster deployment and bootstrapping. Using the Flux AKS extension allows your cluster to start already bootstrapped and sets you up with a solid management foundation going forward.
18
18
19
+
### Additional resources
20
+
21
+
In addition to ACR being deployed to support bootstrapping, this is where any other resources that are considered not tied to the lifecycle of an individual cluster is deployed. ACR is one example as talked about above. Another example could be an AKS Backup Vault and backup artifacts storage account which likely would exist prior to and after any individual AKS cluster's existance. When designing your pipelines, ensure to isolate components by their lifecycle watch for singletons in an architecture. These are typically resources like regional logging sinks, supporting global routing infrastructure, etc. This is in contrast to potentially transiently/replaceable components, like the AKS cluster itself. _This implemention does not represent a complete seperation of stamp vs regional resources, but is fairly close. Deviations are strickly for ease of deployment in this walkthrough instead of as examples of guidance._
19
22
## Steps
20
23
21
24
1. Create the AKS cluster resource group.
@@ -38,7 +41,7 @@ We'll be bootstrapping this cluster with the Flux GitOps agent as installed as a
// This Log Analytics workspace will be the log sink for all resources in the cluster resource group. This includes ACR, the AKS cluster, Key Vault, etc. It also is the Container Insights log sink for the AKS cluster.
0 commit comments