Skip to content

Commit 130a484

Browse files
authoredJan 13, 2025
Merge pull request #736 from MicrosoftDocs/main
1/13/2025 PM Publish
2 parents 5aaa25e + 2255c81 commit 130a484

22 files changed

+1316
-229
lines changed
 

‎articles/aks/TOC.yml

+8
Original file line numberDiff line numberDiff line change
@@ -400,6 +400,14 @@
400400
href: create-mongodb-infrastructure.md
401401
- name: Deploy MongoDB cluster
402402
href: deploy-mongodb-cluster.md
403+
- name: Deploy Mongo Express client application
404+
href: validate-mongodb-cluster.md
405+
- name: Test resiliency
406+
href: resiliency-mongodb-cluster.md
407+
- name: Validate resiliency during node pool upgrade
408+
href: upgrade-mongodb-cluster.md
409+
- name: Monitor with Percona Monitoring and Management
410+
href: monitor-aks-mongodb.md
403411
- name: Deploy a highly available PostgreSQL database
404412
items:
405413
- name: Overview

‎articles/aks/configure-kubenet.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -226,7 +226,7 @@ When you create an AKS cluster, a network security group and route table are aut
226226
With kubenet, a route table must exist on your cluster subnet(s). AKS supports bringing your own existing subnet and route table. If your custom subnet doesn't contain a route table, AKS creates one for you and adds rules throughout the cluster lifecycle. If your custom subnet contains a route table when you create your cluster, AKS acknowledges the existing route table during cluster operations and adds/updates rules accordingly for cloud provider operations.
227227
228228
> [!WARNING]
229-
> You can add/update custom rules on the custom route table. However, rules are added by the Kubernetes cloud provider which can't be updated or removed. Rules such as *0.0.0.0/0* must always exist on a given route table and map to the target of your internet gateway, such as an NVA or other egress gateway. Take caution when updating rules.
229+
> You can add/update custom rules on the custom route table. However, rules are added by the Kubernetes cloud provider which can't be updated or removed. Rules such as *0.0.0.0/0* generally exist on a given route table (unless the egress outbound type is `none`) and map to the target of your internet gateway, such as an NVA or other egress gateway. Take caution when updating rules.
230230
231231
Learn more about setting up a [custom route table][custom-route-table].
232232

‎articles/aks/create-mongodb-infrastructure.md

+136-112
Large diffs are not rendered by default.

‎articles/aks/create-node-pools.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ The following limitations apply when you create AKS clusters that support multip
4444
## Create an AKS cluster
4545

4646
> [!IMPORTANT]
47-
> If you run a single system node pool for your AKS cluster in a production environment, we recommend you use at least three nodes for the node pool. If one node goes down, you lose control plane resources and redundancy is compromised. You can mitigate this risk by having more control plane nodes.
47+
> If you run a single system node pool for your AKS cluster in a production environment, we recommend you use at least three nodes for the node pool. If one node goes down, the redundancy is compromised. You can mitigate this risk by having more system node pool nodes.
4848
4949
1. Create an Azure resource group using the [`az group create`][az-group-create] command.
5050

‎articles/aks/csi-secrets-store-configuration-options.md

+11-12
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: nickomang
55
ms.author: nickoman
66
ms.subservice: aks-security
77
ms.topic: how-to
8-
ms.date: 10/19/2023
8+
ms.date: 01/03/2025
99
ms.custom: template-how-to, devx-track-azurecli
1010
---
1111

@@ -17,17 +17,16 @@ Follow the steps in [Use the Azure Key Vault provider for Secrets Store CSI Driv
1717

1818
### Enable and disable auto-rotation
1919

20-
> [!NOTE]
21-
> When the Azure Key Vault provider for Secrets Store CSI Driver is enabled, it updates the pod mount and the Kubernetes secret defined in the `secretObjects` field of `SecretProviderClass`. It does so by polling for changes periodically, based on the rotation poll interval you defined. The default rotation poll interval is *two minutes*.
22-
23-
>[!NOTE]
24-
> When a secret updates in an external secrets store after initial pod deployment, the Kubernetes Secret and the pod mount periodically update depending on how the application consumes the secret data.
25-
>
26-
> **Mount the Kubernetes Secret as a volume**: Use the auto-rotation and sync K8s secrets features of Secrets Store CSI Driver. The application needs to watch for changes from the mounted Kubernetes Secret volume. When the CSI Driver updates the Kubernetes Secret, the corresponding volume contents automatically update as well.
27-
>
28-
> **Application reads the data from the container filesystem**: Use the rotation feature of Secrets Store CSI Driver. The application needs to watch for the file change from the volume mounted by the CSI driver.
29-
>
30-
> **Use the Kubernetes Secret for an environment variable**: Restart the pod to get the latest secret as an environment variable. Use a tool such as [Reloader][reloader] to watch for changes on the synced Kubernetes Secret and perform rolling upgrades on pods.
20+
Once you enable auto-rotation for Azure Key Vault Secrets Provider, it updates the pod mount and the Kubernetes secret defined in the `secretObjects` field of `SecretProviderClass`. It does so by polling for changes periodically, based on the rotation poll interval you defined. The default rotation poll interval is *two minutes*.
21+
22+
23+
When a secret updates in an external secrets store after initial pod deployment, the Kubernetes Secret and the pod mount periodically update depending on how the application consumes the secret data.
24+
25+
* Mount the Kubernetes Secret as a volume: Use the auto-rotation and sync K8s secrets features of Secrets Store CSI Driver. The application needs to watch for changes from the mounted Kubernetes Secret volume. When the CSI Driver updates the Kubernetes Secret, the corresponding volume contents automatically update as well.
26+
27+
* Application reads the data from the container filesystem: Use the rotation feature of Secrets Store CSI Driver. The application needs to watch for the file change from the volume mounted by the CSI driver.
28+
29+
* Use the Kubernetes Secret for an environment variable: Restart the pod to get the latest secret as an environment variable. Use a tool such as [Reloader][reloader] to watch for changes on the synced Kubernetes Secret and perform rolling upgrades on pods.
3130

3231
#### Enable auto-rotation on a new AKS cluster
3332

0 commit comments

Comments
 (0)
Please sign in to comment.