Skip to content

Commit 11490dc

Browse files
committed
Ideosyncratic rules
1 parent 0a7ae20 commit 11490dc

3 files changed

Lines changed: 6 additions & 6 deletions

File tree

learn-pr/wwl-azure/deploy-applications-azure-kubernetes-service/includes/2-azure-kubernetes-pod-configuration.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,10 @@ You can apply and enforce security settings on pods hosted in Azure Kubernetes S
22

33
### Explore Azure Policy add-on for AKS
44

5-
[Azure Policy for Kubernetes](https://learn.microsoft.com/azure/governance/policy/concepts/policy-for-kubernetes) extends Gatekeeper v3, an admission controller webhook for Open Policy Agent (OPA), to apply at-scale enforcements and safeguards in a centralized, consistent manner. Current Azure Policy add-on versions still use Gatekeeper v3. On supported add-on and Kubernetes versions, the add-on can also generate Kubernetes-native ValidatingAdmissionPolicy (VAP) resources for Common Expression Language (CEL)-based policies. Azure Policy makes it possible to manage and report on the compliance state of your AKS environment.
5+
[Azure Policy for Kubernetes](/azure/governance/policy/concepts/policy-for-kubernetes) extends Gatekeeper v3, an admission controller webhook for Open Policy Agent (OPA), to apply at-scale enforcements and safeguards in a centralized, consistent manner. Current Azure Policy add-on versions still use Gatekeeper v3. On supported add-on and Kubernetes versions, the add-on can also generate Kubernetes-native ValidatingAdmissionPolicy (VAP) resources for Common Expression Language (CEL)-based policies. Azure Policy makes it possible to manage and report on the compliance state of your AKS environment.
66

77
> [!NOTE]
8-
> You can implement namespace-level security policies for individual AKS clusters (without relying on Azure Policy) by using [Pod Security Admission](https://learn.microsoft.com/azure/aks/use-psa). Pod Security Admission is enabled by default in AKS clusters running Kubernetes version 1.23 or later, but AKS doesn't enforce baseline or restricted policies on namespaces automatically. To apply a profile, label the namespace (for example, `pod-security.kubernetes.io/enforce=restricted`). PSA replaces the Kubernetes PodSecurityPolicy feature, which was deprecated in Kubernetes 1.21 and removed in Kubernetes 1.25. In enterprise scenarios, you should consider using Azure Policy-based policies instead.
8+
> You can implement namespace-level security policies for individual AKS clusters (without relying on Azure Policy) by using [Pod Security Admission](/azure/aks/use-psa). Pod Security Admission is enabled by default in AKS clusters running Kubernetes version 1.23 or later, but AKS doesn't enforce baseline or restricted policies on namespaces automatically. To apply a profile, label the namespace (for example, `pod-security.kubernetes.io/enforce=restricted`). PSA replaces the Kubernetes PodSecurityPolicy feature, which was deprecated in Kubernetes 1.21 and removed in Kubernetes 1.25. In enterprise scenarios, you should consider using Azure Policy-based policies instead.
99
1010
To implement Azure Policy for AKS, register the `Microsoft.PolicyInsights` resource provider in the subscription, verify that the cluster runs a supported AKS Kubernetes version, and then install the Azure Policy add-on for AKS. The add-on manages interaction between Azure Policy and Gatekeeper components, including the following tasks:
1111

@@ -23,7 +23,7 @@ To install the Azure Policy add-on for AKS, you can use the Azure portal, Azure
2323

2424
### Review built-in Azure Policy for AKS initiative and policy definitions targeting pod configurations
2525

26-
Commonly used [Azure Policy built-in initiatives](https://learn.microsoft.com/azure/governance/policy/samples/built-in-initiatives#kubernetes) for AKS targeting pod security include:
26+
Commonly used [Azure Policy built-in initiatives](/azure/governance/policy/samples/built-in-initiatives#kubernetes) for AKS targeting pod security include:
2727

2828
- Kubernetes cluster pod security baseline standards for Linux-based workloads.
2929
- Kubernetes cluster pod security restricted standards for Linux-based workloads.

learn-pr/wwl-azure/deploy-applications-azure-kubernetes-service/includes/4-configure-application-azure-kubernetes-cluster.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,13 @@ AKS supports both stateless and stateful workloads. Stateful workloads typically
44

55
### Select the right storage service
66

7-
When choosing the optimal storage for AKS containerized workloads, review [AKS storage concepts](https://learn.microsoft.com/azure/aks/concepts-storage) and choose from the following options:
7+
When choosing the optimal storage for AKS containerized workloads, review [AKS storage concepts](/azure/aks/concepts-storage) and choose from the following options:
88

99
- **Application-level access to structured or semi-structured data**. For structured or semi-structured data, use a platform managed database, such as Azure SQL, Azure Database for MySQL, Azure Database for PostgreSQL, and Azure Cosmos DB.
1010
- **File-level access to data**. For shared application data that requires high performance, use Azure NetApp Files or Azure Files SSD provisioned v2 shares (`PremiumV2_LRS` or `PremiumV2_ZRS`). The earlier `Premium_LRS` and `Premium_ZRS` SSD shares are still supported, but provisioned v2 is recommended for new deployments. For shared data that requires moderate performance, use Azure Files HDD pay-as-you-go or HDD provisioned v2 shares.
1111
- **Block-level access to data (self-managed)**. For applications requiring consistently low latency, high IOPS, and high throughput, use Azure Premium SSD, Azure Premium SSD v2, or Azure Ultra Disk Storage. These options provide flexibility when you want to manage storage characteristics yourself.
1212
- **Object-level access to data**. For large unstructured data, interact with Azure Blob Storage directly, or mount Blob Storage by using the Azure Blob CSI driver with NFS v3.0 or BlobFuse.
13-
- **Block-level access to data (fully managed)**. For a fully managed, cloud-based volume management and orchestration solution, consider [Azure Container Storage](https://learn.microsoft.com/azure/storage/container-storage/container-storage-introduction). It integrates with Kubernetes, allowing dynamic and automatic provisioning of persistent volumes. Azure Container Storage 2.0.x supports local NVMe disks; 2.1.x and later add support for Azure Elastic SAN. Use Azure Container Storage 2.1.x or later for local NVMe or Azure Elastic SAN, and a supported 1.x release for Azure Disks, because the 2.x line doesn't support Azure Disks.
13+
- **Block-level access to data (fully managed)**. For a fully managed, cloud-based volume management and orchestration solution, consider [Azure Container Storage](/azure/storage/container-storage/container-storage-introduction). It integrates with Kubernetes, allowing dynamic and automatic provisioning of persistent volumes. Azure Container Storage 2.0.x supports local NVMe disks; 2.1.x and later add support for Azure Elastic SAN. Use Azure Container Storage 2.1.x or later for local NVMe or Azure Elastic SAN, and a supported 1.x release for Azure Disks, because the 2.x line doesn't support Azure Disks.
1414

1515
### Plan for pod volumes
1616

learn-pr/wwl-azure/deploy-applications-azure-kubernetes-service/includes/5-deploy-application-azure-kubernetes-cluster.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Stateful workloads that require stable network identities, ordered deployment or
2626

2727
Most stateless applications in AKS should be managed by Deployments rather than as individually scheduled pods. Kubernetes can monitor Deployment health and status to ensure that the required number of replicas run within the cluster. When scheduled individually, pods don't have a controller to create a replacement if the pod is deleted or the node fails. The kubelet might restart containers on the same node according to the pod's restart policy, but Kubernetes doesn't recreate the pod elsewhere. In addition, Deployments support controlled rollouts and rollbacks.
2828

29-
To help define the Deployment, you use a manifest file in YAML format. You reference the manifest file when running the `kubectl create` or `kubectl apply` commands. For more information, see [AKS cluster and workload concepts](https://learn.microsoft.com/azure/aks/concepts-clusters-workloads).
29+
To help define the Deployment, you use a manifest file in YAML format. You reference the manifest file when running the `kubectl create` or `kubectl apply` commands. For more information, see [AKS cluster and workload concepts](/azure/aks/concepts-clusters-workloads).
3030

3131
### Deploy AKS workloads with Helm
3232

0 commit comments

Comments
 (0)