Skip to content

Commit a63fbfe

Browse files
authored
AKS Update to 1.26.0 (#374)
WAF Policy Update Various API Updates Linter Updates Add a few walkthrough notes Update Alerts and add data cap alert for LA
1 parent ba16f32 commit a63fbfe

8 files changed

+106
-49
lines changed

01-prerequisites.md

+2-5
Original file line numberDiff line numberDiff line change
@@ -30,19 +30,16 @@ This is the starting point for the instructions on deploying the [AKS baseline r
3030

3131
1. While the following feature(s) are still in _preview_, please enable them in your target subscription.
3232

33-
1. [Register the Defender for Containers preview feature = `AKS-AzureDefender`](https://learn.microsoft.com/azure/defender-for-cloud/defender-for-containers-enable?pivots=defender-for-container-aks&tabs=k8s-deploy-cli%2Ck8s-deploy-asc%2Ck8s-verify-asc%2Ck8s-remove-arc%2Caks-removeprofile-api#deploy-the-defender-profile)
34-
3533
1. [Register the Workload Identity preview feature = `EnableWorkloadIdentityPreview`](https://learn.microsoft.com/azure/aks/workload-identity-deploy-cluster#register-the-enableworkloadidentitypreview-feature-flag)
3634

37-
1. Register the ImageCleaner (Earser) preview feature = `EnableImageCleanerPreview`](https://learn.microsoft.com/azure/aks/image-cleaner#prerequisites)
35+
1. [Register the ImageCleaner (Earser) preview feature = `EnableImageCleanerPreview`](https://learn.microsoft.com/azure/aks/image-cleaner#prerequisites)
3836

3937
```bash
40-
az feature register --namespace "Microsoft.ContainerService" -n "AKS-AzureDefender"
4138
az feature register --namespace "Microsoft.ContainerService" -n "EnableWorkloadIdentityPreview"
4239
az feature register --namespace "Microsoft.ContainerService" -n "EnableImageCleanerPreview"
4340

4441
# Keep running until all say "Registered." (This may take up to 20 minutes.)
45-
az feature list -o table --query "[?name=='Microsoft.ContainerService/AKS-AzureDefender' || name=='Microsoft.ContainerService/EnableWorkloadIdentityPreview' || name=='Microsoft.ContainerService/EnableImageCleanerPreview'].{Name:name,State:properties.state}"
42+
az feature list -o table --query "[?name=='Microsoft.ContainerService/EnableWorkloadIdentityPreview' || name=='Microsoft.ContainerService/EnableImageCleanerPreview'].{Name:name,State:properties.state}"
4643

4744
# When all say "Registered" then re-register the AKS resource provider
4845
az provider register --namespace Microsoft.ContainerService

03-aad.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ This does not configure anything related to workload identity. This configuratio
2929

3030
1. Playing the role as the Contoso Bicycle Azure AD team, login into the tenant where Kubernetes Cluster API authorization will be associated with.
3131

32-
> :bulb: Skip the `az login` command if you plan to use your current user account's Azure AD tenant for Kubernetes authorization.
32+
> :bulb: Skip the `az login` command if you plan to use your current user account's Azure AD tenant for Kubernetes authorization. _Using the same tenant is common._
3333
3434
```bash
3535
az login -t <Replace-With-ClusterApi-AzureAD-TenantId> --allow-no-subscriptions

04-networking.md

+6
Original file line numberDiff line numberDiff line change
@@ -104,6 +104,12 @@ The following two resource groups will be created and populated with networking
104104
>
105105
> Hubs and spokes are controlled by the networking team's GitHub Actions workflows. This automation is not included in this reference implementation as this body of work is focused on the AKS baseline and not the networking team's CI/CD practices.
106106
107+
## Private DNS Zones
108+
109+
Private DNS zones in this reference implementation are implemented directly at the spoke level, meaning the workload team creates the private link DNS zones & records for the resources needed; furthermore, the workload is directly using Azure DNS for resolution. Your networking topology might support this decentralized model or instead DNS & DNS zones for Private Link might be handed at the regional hub or in a [VWAN virtual hub extension](https://learn.microsoft.com/azure/architecture/guide/networking/private-link-vwan-dns-virtual-hub-extension-pattern) by your networking team.
110+
111+
If your organization operate a centeralized DNS model, you'll need to adapt how DNS zones records are managed this implementation into your existing enteprise networking DNS zone strategy. Since this reference implementation is expected to be deployed isolated from existing infrastructure; this is not something you need to address now; but will be something to understand and address when taking your solution to production.
112+
107113
### Next step
108114

109115
:arrow_forward: [Prep for cluster bootstrapping](./05-bootstrap-prep.md)

05-bootstrap-prep.md

+5-2
Original file line numberDiff line numberDiff line change
@@ -12,10 +12,13 @@ Container registries often have a lifecycle that extends beyond the scope of a s
1212

1313
The role of this pre-existing ACR instance is made more prominant when we think about cluster bootstrapping. That is the process that happens after Azure resource deployment of the cluster, but before your first workload lands in the cluster. The cluster will be bootstrapped _immedately and automatically_ after resource deployment, which means you'll need ACR in place to act as your official OCI artifact repository for required images and Helm charts used in that bootstrapping process.
1414

15-
### Method
15+
### Bootstrapping method
1616

1717
We'll be bootstrapping this cluster with the Flux GitOps agent as installed as an AKS extension. This specific choice does not imply that Flux, or GitOps in general, is the only approach to bootstrapping. Consider your organizational familiarity and acceptance of tooling like this and decide if cluster bootstrapping should be performed with GitOps or via your deployment pipelines. If you are running a fleet of clusters, a GitOps approach is highly recommended for uniformity and easier governance. When running only a few clusters, GitOps might be seen as "too much" and you might instead opt for integrating that process into one or more deployment pipelines to ensure bootstrapping takes place. No matter which way you go, you'll need your bootstrapping artifacts ready to go before you start your cluster deployment so that you can minimize the time between cluster deployment and bootstrapping. Using the Flux AKS extension allows your cluster to start already bootstrapped and sets you up with a solid management foundation going forward.
1818

19+
### Additional resources
20+
21+
In addition to ACR being deployed to support bootstrapping, this is where any other resources that are considered not tied to the lifecycle of an individual cluster is deployed. ACR is one example as talked about above. Another example could be an AKS Backup Vault and backup artifacts storage account which likely would exist prior to and after any individual AKS cluster's existance. When designing your pipelines, ensure to isolate components by their lifecycle watch for singletons in an architecture. These are typically resources like regional logging sinks, supporting global routing infrastructure, etc. This is in contrast to potentially transiently/replaceable components, like the AKS cluster itself. _This implemention does not represent a complete seperation of stamp vs regional resources, but is fairly close. Deviations are strickly for ease of deployment in this walkthrough instead of as examples of guidance._
1922
## Steps
2023

2124
1. Create the AKS cluster resource group.
@@ -38,7 +41,7 @@ We'll be bootstrapping this cluster with the Flux GitOps agent as installed as a
3841
echo RESOURCEID_VNET_CLUSTERSPOKE_AKS_BASELINE: $RESOURCEID_VNET_CLUSTERSPOKE_AKS_BASELINE
3942
```
4043

41-
1. Deploy the container registry template.
44+
1. Deploy the container registry and non-stamp resources template.
4245

4346
```bash
4447
# [This takes about four minutes.]

acr-stamp.bicep

+54-13
Original file line numberDiff line numberDiff line change
@@ -58,37 +58,78 @@ var subRgUniqueString = uniqueString('aks', subscription().subscriptionId, resou
5858

5959
/*** EXISTING RESOURCES ***/
6060

61-
resource spokeResourceGroup 'Microsoft.Resources/resourceGroups@2021-04-01' existing = {
61+
resource spokeResourceGroup 'Microsoft.Resources/resourceGroups@2022-09-01' existing = {
6262
scope: subscription()
63-
name: '${split(targetVnetResourceId,'/')[4]}'
63+
name: split(targetVnetResourceId,'/')[4]
6464
}
6565

66-
resource spokeVirtualNetwork 'Microsoft.Network/virtualNetworks@2021-05-01' existing = {
66+
resource spokeVirtualNetwork 'Microsoft.Network/virtualNetworks@2022-09-01' existing = {
6767
scope: spokeResourceGroup
68-
name: '${last(split(targetVnetResourceId,'/'))}'
68+
name: last(split(targetVnetResourceId,'/'))
6969

70-
resource snetPrivateLinkEndpoints 'subnets@2021-05-01' existing = {
70+
resource snetPrivateLinkEndpoints 'subnets' existing = {
7171
name: 'snet-privatelinkendpoints'
7272
}
7373
}
7474

7575
/*** RESOURCES ***/
7676

7777
// This Log Analytics workspace will be the log sink for all resources in the cluster resource group. This includes ACR, the AKS cluster, Key Vault, etc. It also is the Container Insights log sink for the AKS cluster.
78-
resource laAks 'Microsoft.OperationalInsights/workspaces@2021-06-01' = {
78+
resource laAks 'Microsoft.OperationalInsights/workspaces@2022-10-01' = {
7979
name: 'la-aks-${subRgUniqueString}'
8080
location: location
8181
properties: {
8282
sku: {
8383
name: 'PerGB2018'
8484
}
8585
retentionInDays: 30
86+
publicNetworkAccessForIngestion: 'Enabled'
87+
publicNetworkAccessForQuery: 'Enabled'
88+
workspaceCapping: {
89+
dailyQuotaGb: -1 // No daily cap (configure alert below if enabled)
90+
}
91+
}
92+
}
93+
94+
// Add a alert rule if the log analytics workspace daily data cap has been reached.
95+
// Logging costs can be a significant part of any architecture, and putting a cap on
96+
// a logging sink (none of which are applied here), can help keep costs in check but
97+
// you run a risk of losing critical data.
98+
resource sqrDailyDataCapBreach 'Microsoft.Insights/scheduledQueryRules@2018-04-16' = {
99+
name: 'Daily data cap breached for workspace ${laAks.name} CIQ-1'
100+
location: location
101+
properties: {
102+
description: 'This alert monitors daily data cap defined on a workspace and fires when the daily data cap is breached.'
103+
displayName: 'Daily data cap breached for workspace ${laAks.name} CIQ-1'
104+
enabled: 'true'
105+
source: {
106+
dataSourceId: laAks.id
107+
queryType: 'ResultCount'
108+
authorizedResources: []
109+
query: '_LogOperation | where Operation == "Data collection Status" | where Detail contains "OverQuota"'
110+
}
111+
schedule: {
112+
frequencyInMinutes: 5
113+
timeWindowInMinutes: 5
114+
}
115+
action: {
116+
'odata.type': 'Microsoft.WindowsAzure.Management.Monitoring.Alerts.Models.Microsoft.AppInsights.Nexus.DataContracts.Resources.ScheduledQueryRules.AlertingAction'
117+
severity: '1'
118+
aznsAction: {
119+
actionGroup: []
120+
}
121+
throttlingInMin: 1440
122+
trigger: {
123+
threshold: 0
124+
thresholdOperator: 'GreaterThan'
125+
}
126+
}
86127
}
87128
}
88129

89130
// Apply the built-in 'Container registries should have anonymous authentication disabled' policy. Azure RBAC only is allowed.
90131
var pdAnonymousContainerRegistryAccessDisallowedId = tenantResourceId('Microsoft.Authorization/policyDefinitions', '9f2dea28-e834-476c-99c5-3507b4728395')
91-
resource paAnonymousContainerRegistryAccessDisallowed 'Microsoft.Authorization/policyAssignments@2021-06-01' = {
132+
resource paAnonymousContainerRegistryAccessDisallowed 'Microsoft.Authorization/policyAssignments@2022-06-01' = {
92133
name: guid(resourceGroup().id, pdAnonymousContainerRegistryAccessDisallowedId)
93134
location: 'global'
94135
scope: resourceGroup()
@@ -107,7 +148,7 @@ resource paAnonymousContainerRegistryAccessDisallowed 'Microsoft.Authorization/p
107148

108149
// Apply the built-in 'Container registries should have local admin account disabled' policy. Azure RBAC only is allowed.
109150
var pdAdminAccountContainerRegistryAccessDisallowedId = tenantResourceId('Microsoft.Authorization/policyDefinitions', 'dc921057-6b28-4fbe-9b83-f7bec05db6c2')
110-
resource paAdminAccountContainerRegistryAccessDisallowed 'Microsoft.Authorization/policyAssignments@2021-06-01' = {
151+
resource paAdminAccountContainerRegistryAccessDisallowed 'Microsoft.Authorization/policyAssignments@2022-06-01' = {
111152
name: guid(resourceGroup().id, pdAdminAccountContainerRegistryAccessDisallowedId)
112153
location: 'global'
113154
scope: resourceGroup()
@@ -130,12 +171,12 @@ resource dnsPrivateZoneAcr 'Microsoft.Network/privateDnsZones@2020-06-01' = {
130171
location: 'global'
131172
properties: {}
132173

133-
resource dnsVnetLinkAcrToSpoke 'virtualNetworkLinks@2020-06-01' = {
174+
resource dnsVnetLinkAcrToSpoke 'virtualNetworkLinks' = {
134175
name: 'to_${spokeVirtualNetwork.name}'
135176
location: 'global'
136177
properties: {
137178
virtualNetwork: {
138-
id: targetVnetResourceId
179+
id: spokeVirtualNetwork.id
139180
}
140181
registrationEnabled: false
141182
}
@@ -209,8 +250,8 @@ resource acrAks_diagnosticsSettings 'Microsoft.Insights/diagnosticSettings@2021-
209250
}
210251
}
211252

212-
// Expose Azure Container Registry via Private Link, into the cluster nodes subnet.
213-
resource privateEndpointAcrToVnet 'Microsoft.Network/privateEndpoints@2021-05-01' = {
253+
// Expose Azure Container Registry via Private Link, into the cluster nodes virtual network.
254+
resource privateEndpointAcrToVnet 'Microsoft.Network/privateEndpoints@2022-09-01' = {
214255
name: 'pe-${acrAks.name}'
215256
location: location
216257
dependsOn: [
@@ -233,7 +274,7 @@ resource privateEndpointAcrToVnet 'Microsoft.Network/privateEndpoints@2021-05-01
233274
]
234275
}
235276

236-
resource privateDnsZoneGroupAcr 'privateDnsZoneGroups@2021-05-01' = {
277+
resource privateDnsZoneGroupAcr 'privateDnsZoneGroups' = {
237278
name: 'default'
238279
properties: {
239280
privateDnsZoneConfigs: [

0 commit comments

Comments
 (0)