Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat (cluster): [extensions] refresh #402

Merged
merged 2 commits into from
Mar 1, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion 05-bootstrap-prep.md
Original file line number Diff line number Diff line change
Expand Up @@ -59,7 +59,7 @@ In addition to Azure Container Registry being deployed to support bootstrapping,
echo ACR_NAME_AKS_BASELINE: $ACR_NAME_AKS_BASELINE

# Import core image(s) hosted in public container registries to be used during bootstrapping
az acr import --source ghcr.io/kubereboot/kured:1.14.0 -n $ACR_NAME_AKS_BASELINE
az acr import --source ghcr.io/kubereboot/kured:1.15.0 -n $ACR_NAME_AKS_BASELINE
```

> In this walkthrough, there is only one image that is included in the bootstrapping process. It's included as a reference for this process. Your choice to use Kubernetes Reboot Daemon (Kured) or any other images, including Helm charts, as part of your bootstrapping is yours to make.
Expand Down
8 changes: 4 additions & 4 deletions cluster-manifests/cluster-baseline-settings/kured.yaml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# Source: https://github.com/kubereboot/charts/tree/kured-5.2.0/charts/kured (1.14.0)
# Source: https://github.com/kubereboot/charts/tree/kured-5.2.0/charts/kured (1.15.0)
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
Expand Down Expand Up @@ -119,10 +119,10 @@ spec:
# PRODUCTION READINESS CHANGE REQUIRED
# This image should be sourced from a non-public container registry, such as the
# one deployed along side of this reference implementation.
# az acr import --source ghcr.io/kubereboot/kured:1.14.0 -n <your-acr-instance-name>
# az acr import --source ghcr.io/kubereboot/kured:1.15.0 -n <your-acr-instance-name>
# and then set this to
# image: <your-acr-instance-name>.azurecr.io/kubereboot/kured:1.14.0
image: ghcr.io/kubereboot/kured:1.14.0
# image: <your-acr-instance-name>.azurecr.io/kubereboot/kured:1.15.0
image: ghcr.io/kubereboot/kured:1.15.0
imagePullPolicy: IfNotPresent
securityContext:
privileged: true # Give permission to nsenter /proc/1/ns/mnt
Expand Down
9 changes: 9 additions & 0 deletions cluster-stamp.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -1741,6 +1741,9 @@ resource mc 'Microsoft.ContainerService/managedClusters@2023-02-02-preview' = {
httpApplicationRouting: {
enabled: false
}
ingressApplicationGateway: {
enabled: false
}
omsagent: {
enabled: true
config: {
Expand All @@ -1756,6 +1759,12 @@ resource mc 'Microsoft.ContainerService/managedClusters@2023-02-02-preview' = {
version: 'v2'
}
}
openServiceMesh: {
enabled: false
}
kubeDashboard: {
enabled: false
}
azureKeyvaultSecretsProvider: {
enabled: true
config: {
Expand Down