diff --git a/.github/ISSUE_TEMPLATE.md b/.github/ISSUE_TEMPLATE.md index 646bfb745..bedc3ec2f 100644 --- a/.github/ISSUE_TEMPLATE.md +++ b/.github/ISSUE_TEMPLATE.md @@ -27,7 +27,7 @@ might close your issue. If we're wrong, PLEASE feel free to reopen it and explain why. --> -**Orchestrator and version (e.g. Kubernetes, DC/OS, Swarm)** +**Kubernetes version**: **What happened**: diff --git a/.prowci/plugins.yaml b/.prowci/plugins.yaml index ac3754e39..d7e558351 100644 --- a/.prowci/plugins.yaml +++ b/.prowci/plugins.yaml @@ -14,8 +14,6 @@ config_updater: label: additional_labels: - orchestrator/k8s - - orchestrator/dcos - - orchestrator/swarm - DO-NOT-MERGE diff --git a/cmd/dcos-upgrade.go b/cmd/dcos-upgrade.go deleted file mode 100644 index ba82c74fd..000000000 --- a/cmd/dcos-upgrade.go +++ /dev/null @@ -1,242 +0,0 @@ -// Copyright (c) Microsoft Corporation. All rights reserved. -// Licensed under the MIT license. - -package cmd - -import ( - "context" - "encoding/json" - "io/ioutil" - "os" - "path" - "path/filepath" - - "github.com/Azure/aks-engine/pkg/api" - "github.com/Azure/aks-engine/pkg/armhelpers" - "github.com/Azure/aks-engine/pkg/helpers" - "github.com/Azure/aks-engine/pkg/i18n" - "github.com/Azure/aks-engine/pkg/operations/dcosupgrade" - "github.com/leonelquinteros/gotext" - "github.com/pkg/errors" - - log "github.com/sirupsen/logrus" - "github.com/spf13/cobra" -) - -const ( - dcosUpgradeName = "dcos-upgrade" - dcosUpgradeShortDescription = "Upgrade an existing DC/OS cluster" - dcosUpgradeLongDescription = "Upgrade an existing DC/OS cluster" -) - -type dcosUpgradeCmd struct { - authArgs - - // user input - resourceGroupName string - deploymentDirectory string - upgradeVersion string - location string - sshPrivateKeyPath string - - // derived - containerService *api.ContainerService - apiVersion string - currentDcosVersion string - client armhelpers.AKSEngineClient - locale *gotext.Locale - nameSuffix string - sshPrivateKey []byte -} - -func newDcosUpgradeCmd() *cobra.Command { - uc := dcosUpgradeCmd{} - - dcosUpgradeCmd := &cobra.Command{ - Use: dcosUpgradeName, - Short: dcosUpgradeShortDescription, - Long: dcosUpgradeLongDescription, - RunE: func(cmd *cobra.Command, args []string) error { - return uc.run(cmd, args) - }, - } - - f := dcosUpgradeCmd.Flags() - f.StringVarP(&uc.location, "location", "l", "", "location the cluster is deployed in (required)") - f.StringVarP(&uc.resourceGroupName, "resource-group", "g", "", "the resource group where the cluster is deployed (required)") - f.StringVar(&uc.deploymentDirectory, "deployment-dir", "", "the location of the output from `generate` (required)") - f.StringVar(&uc.sshPrivateKeyPath, "ssh-private-key-path", "", "ssh private key path (default: /id_rsa)") - f.StringVar(&uc.upgradeVersion, "upgrade-version", "", "desired DC/OS version (required)") - addAuthFlags(&uc.authArgs, f) - - return dcosUpgradeCmd -} - -func (uc *dcosUpgradeCmd) validate(cmd *cobra.Command) error { - log.Infoln("validating...") - - var err error - - uc.locale, err = i18n.LoadTranslations() - if err != nil { - return errors.Wrap(err, "error loading translation files") - } - - if len(uc.resourceGroupName) == 0 { - cmd.Usage() - return errors.New("--resource-group must be specified") - } - - if len(uc.location) == 0 { - cmd.Usage() - return errors.New("--location must be specified") - } - uc.location = helpers.NormalizeAzureRegion(uc.location) - - if len(uc.upgradeVersion) == 0 { - cmd.Usage() - return errors.New("--upgrade-version must be specified") - } - - if len(uc.deploymentDirectory) == 0 { - cmd.Usage() - return errors.New("--deployment-dir must be specified") - } - - if len(uc.sshPrivateKeyPath) == 0 { - uc.sshPrivateKeyPath = filepath.Join(uc.deploymentDirectory, "id_rsa") - } - if uc.sshPrivateKey, err = ioutil.ReadFile(uc.sshPrivateKeyPath); err != nil { - cmd.Usage() - return errors.Wrap(err, "ssh-private-key-path must be specified") - } - - if err = uc.authArgs.validateAuthArgs(); err != nil { - return err - } - return nil -} - -func (uc *dcosUpgradeCmd) loadCluster(cmd *cobra.Command) error { - var err error - - if uc.client, err = uc.authArgs.getClient(); err != nil { - return errors.Wrap(err, "Failed to get client") - } - - ctx := context.Background() - _, err = uc.client.EnsureResourceGroup(ctx, uc.resourceGroupName, uc.location, nil) - if err != nil { - return errors.Wrap(err, "Error ensuring resource group") - } - - // load apimodel from the deployment directory - apiModelPath := path.Join(uc.deploymentDirectory, "apimodel.json") - - if _, err = os.Stat(apiModelPath); os.IsNotExist(err) { - return errors.Errorf("specified api model does not exist (%s)", apiModelPath) - } - - apiloader := &api.Apiloader{ - Translator: &i18n.Translator{ - Locale: uc.locale, - }, - } - uc.containerService, uc.apiVersion, err = apiloader.LoadContainerServiceFromFile(apiModelPath, true, true, nil) - if err != nil { - return errors.Wrap(err, "error parsing the api model") - } - uc.currentDcosVersion = uc.containerService.Properties.OrchestratorProfile.OrchestratorVersion - - if uc.currentDcosVersion == uc.upgradeVersion { - return errors.Errorf("already running DCOS %s", uc.upgradeVersion) - } - - if len(uc.containerService.Location) == 0 { - uc.containerService.Location = uc.location - } else if uc.containerService.Location != uc.location { - return errors.New("--location does not match api model location") - } - - // get available upgrades for container service - orchestratorInfo, err := api.GetOrchestratorVersionProfile(uc.containerService.Properties.OrchestratorProfile, false) - if err != nil { - return errors.Wrap(err, "error getting list of available upgrades") - } - // add the current version if upgrade has failed - orchestratorInfo.Upgrades = append(orchestratorInfo.Upgrades, &api.OrchestratorProfile{ - OrchestratorType: uc.containerService.Properties.OrchestratorProfile.OrchestratorType, - OrchestratorVersion: uc.containerService.Properties.OrchestratorProfile.OrchestratorVersion}) - - // validate desired upgrade version and set goal state - found := false - for _, up := range orchestratorInfo.Upgrades { - if up.OrchestratorVersion == uc.upgradeVersion { - uc.containerService.Properties.OrchestratorProfile.OrchestratorVersion = uc.upgradeVersion - found = true - break - } - } - if !found { - return errors.Errorf("upgrade to DCOS %s is not supported", uc.upgradeVersion) - } - - // Read name suffix to identify nodes in the resource group that belong - // to this cluster. - templatePath := path.Join(uc.deploymentDirectory, "azuredeploy.json") - contents, _ := ioutil.ReadFile(templatePath) - - var template interface{} - json.Unmarshal(contents, &template) - - templateMap := template.(map[string]interface{}) - templateParameters := templateMap["parameters"].(map[string]interface{}) - - nameSuffixParam := templateParameters["nameSuffix"].(map[string]interface{}) - uc.nameSuffix = nameSuffixParam["defaultValue"].(string) - log.Infof("Name suffix: %s", uc.nameSuffix) - return nil -} - -func (uc *dcosUpgradeCmd) run(cmd *cobra.Command, args []string) error { - err := uc.validate(cmd) - if err != nil { - log.Fatalf("error validating upgrade command: %v", err) - } - - err = uc.loadCluster(cmd) - if err != nil { - log.Fatalf("error loading existing cluster: %v", err) - } - - upgradeCluster := dcosupgrade.UpgradeCluster{ - Translator: &i18n.Translator{ - Locale: uc.locale, - }, - Logger: log.NewEntry(log.New()), - Client: uc.client, - } - - if err = upgradeCluster.UpgradeCluster(uc.authArgs.SubscriptionID, uc.resourceGroupName, uc.currentDcosVersion, - uc.containerService, uc.nameSuffix, uc.sshPrivateKey); err != nil { - log.Fatalf("Error upgrading cluster: %v", err) - } - - apiloader := &api.Apiloader{ - Translator: &i18n.Translator{ - Locale: uc.locale, - }, - } - b, err := apiloader.SerializeContainerService(uc.containerService, uc.apiVersion) - if err != nil { - return err - } - - f := helpers.FileSaver{ - Translator: &i18n.Translator{ - Locale: uc.locale, - }, - } - - return f.SaveFile(uc.deploymentDirectory, "apimodel.json", b) -} diff --git a/cmd/dcos-upgrade_test.go b/cmd/dcos-upgrade_test.go deleted file mode 100644 index 610ee8d6d..000000000 --- a/cmd/dcos-upgrade_test.go +++ /dev/null @@ -1,167 +0,0 @@ -// Copyright (c) Microsoft Corporation. All rights reserved. -// Licensed under the MIT license. - -package cmd - -import ( - "io/ioutil" - "os" - - . "github.com/onsi/ginkgo" - . "github.com/onsi/gomega" - "github.com/pkg/errors" - "github.com/spf13/cobra" -) - -var _ = Describe("the upgrade command", func() { - - It("should create a DCOS upgrade command", func() { - output := newDcosUpgradeCmd() - - Expect(output.Use).Should(Equal(dcosUpgradeName)) - Expect(output.Short).Should(Equal(dcosUpgradeShortDescription)) - Expect(output.Long).Should(Equal(dcosUpgradeLongDescription)) - Expect(output.Flags().Lookup("location")).NotTo(BeNil()) - Expect(output.Flags().Lookup("resource-group")).NotTo(BeNil()) - Expect(output.Flags().Lookup("deployment-dir")).NotTo(BeNil()) - Expect(output.Flags().Lookup("ssh-private-key-path")).NotTo(BeNil()) - Expect(output.Flags().Lookup("upgrade-version")).NotTo(BeNil()) - }) - - It("should validate DCOS upgrade command", func() { - r := &cobra.Command{} - privKey, err := ioutil.TempFile("", "id_rsa") - Expect(err).To(BeNil()) - defer os.Remove(privKey.Name()) - - cases := []struct { - uc *dcosUpgradeCmd - expectedErr error - hideLocalAzConfig bool - }{ - { - uc: &dcosUpgradeCmd{ - resourceGroupName: "", - deploymentDirectory: "_output/test", - upgradeVersion: "1.8.9", - location: "centralus", - sshPrivateKeyPath: privKey.Name(), - authArgs: authArgs{ - rawSubscriptionID: "99999999-0000-0000-0000-000000000000", - }, - }, - expectedErr: errors.New("--resource-group must be specified"), - }, - { - uc: &dcosUpgradeCmd{ - resourceGroupName: "test", - deploymentDirectory: "_output/test", - upgradeVersion: "1.8.9", - location: "", - sshPrivateKeyPath: privKey.Name(), - authArgs: authArgs{ - rawSubscriptionID: "99999999-0000-0000-0000-000000000000", - }, - }, - expectedErr: errors.New("--location must be specified"), - }, - { - uc: &dcosUpgradeCmd{ - resourceGroupName: "test", - deploymentDirectory: "_output/test", - upgradeVersion: "", - location: "southcentralus", - sshPrivateKeyPath: privKey.Name(), - authArgs: authArgs{ - rawSubscriptionID: "99999999-0000-0000-0000-000000000000", - }, - }, - expectedErr: errors.New("--upgrade-version must be specified"), - }, - { - uc: &dcosUpgradeCmd{ - resourceGroupName: "test", - deploymentDirectory: "", - upgradeVersion: "1.9.0", - location: "southcentralus", - sshPrivateKeyPath: privKey.Name(), - authArgs: authArgs{ - rawSubscriptionID: "99999999-0000-0000-0000-000000000000", - }, - }, - expectedErr: errors.New("--deployment-dir must be specified"), - }, - { - uc: &dcosUpgradeCmd{ - resourceGroupName: "test", - deploymentDirectory: "", - upgradeVersion: "1.9.0", - location: "southcentralus", - sshPrivateKeyPath: privKey.Name(), - authArgs: authArgs{ - rawSubscriptionID: "99999999-0000-0000-0000-000000000000", - }, - }, - expectedErr: errors.New("--deployment-dir must be specified"), - }, - { - uc: &dcosUpgradeCmd{ - resourceGroupName: "test", - deploymentDirectory: "_output/mydir", - upgradeVersion: "1.9.0", - location: "southcentralus", - sshPrivateKeyPath: privKey.Name(), - authArgs: authArgs{}, - }, - expectedErr: errors.New("--subscription-id is required (and must be a valid UUID)"), - hideLocalAzConfig: true, - }, - { - uc: &dcosUpgradeCmd{ - resourceGroupName: "test", - deploymentDirectory: "_output/mydir", - upgradeVersion: "1.9.0", - location: "southcentralus", - authArgs: authArgs{}, - }, - expectedErr: errors.New("ssh-private-key-path must be specified: open _output/mydir/id_rsa: no such file or directory"), - }, - { - uc: &dcosUpgradeCmd{ - resourceGroupName: "test", - deploymentDirectory: "_output/mydir", - upgradeVersion: "1.9.0", - location: "southcentralus", - sshPrivateKeyPath: privKey.Name(), - authArgs: authArgs{ - rawSubscriptionID: "99999999-0000-0000-0000-000000000000", - RawAzureEnvironment: "AzurePublicCloud", - AuthMethod: "device", - }, - }, - expectedErr: nil, - }, - } - - for _, c := range cases { - - if c.hideLocalAzConfig { - // Temporarily unset HOME env var so local subscription won't override test config - home := os.Getenv("HOME") - os.Setenv("HOME", "") - err = c.uc.validate(r) - os.Setenv("HOME", home) - } else { - err = c.uc.validate(r) - } - - if c.expectedErr != nil && err != nil { - Expect(err.Error()).To(Equal(c.expectedErr.Error())) - } else { - Expect(err).To(BeNil()) - Expect(c.expectedErr).To(BeNil()) - } - } - - }) -}) diff --git a/cmd/root.go b/cmd/root.go index fb58d5830..fb994255b 100644 --- a/cmd/root.go +++ b/cmd/root.go @@ -24,8 +24,8 @@ import ( const ( rootName = "aks-engine" - rootShortDescription = "AKS-Engine deploys and manages container orchestrators in Azure" - rootLongDescription = "AKS-Engine deploys and manages Kubernetes, Swarm Mode, and DC/OS clusters in Azure" + rootShortDescription = "AKS-Engine deploys and manages Kubernetes clusters in Azure" + rootLongDescription = "AKS-Engine deploys and manages Kubernetes clusters in Azure" ) var ( @@ -64,7 +64,6 @@ func NewRootCmd() *cobra.Command { rootCmd.AddCommand(newOrchestratorsCmd()) rootCmd.AddCommand(newUpgradeCmd()) rootCmd.AddCommand(newScaleCmd()) - rootCmd.AddCommand(newDcosUpgradeCmd()) rootCmd.AddCommand(getCompletionCmd(rootCmd)) return rootCmd diff --git a/cmd/root_test.go b/cmd/root_test.go index 4328a0381..0b60ccc50 100644 --- a/cmd/root_test.go +++ b/cmd/root_test.go @@ -16,7 +16,7 @@ func TestNewRootCmd(t *testing.T) { if output.Use != rootName || output.Short != rootShortDescription || output.Long != rootLongDescription { t.Fatalf("root command should have use %s equal %s, short %s equal %s and long %s equal to %s", output.Use, rootName, output.Short, rootShortDescription, output.Long, rootLongDescription) } - expectedCommands := []*cobra.Command{getCompletionCmd(output), newDcosUpgradeCmd(), newDeployCmd(), newGenerateCmd(), newOrchestratorsCmd(), newScaleCmd(), newUpgradeCmd(), newVersionCmd()} + expectedCommands := []*cobra.Command{getCompletionCmd(output), newDeployCmd(), newGenerateCmd(), newOrchestratorsCmd(), newScaleCmd(), newUpgradeCmd(), newVersionCmd()} rc := output.Commands() for i, c := range expectedCommands { if rc[i].Use != c.Use { diff --git a/cmd/scale.go b/cmd/scale.go index 2f36d114b..2f803c545 100644 --- a/cmd/scale.go +++ b/cmd/scale.go @@ -381,13 +381,6 @@ func (sc *scaleCmd) run(cmd *cobra.Command, args []string) error { if sc.agentPool.IsAvailabilitySets() { addValue(parametersJSON, fmt.Sprintf("%sOffset", sc.agentPool.Name), highestUsedIndex+1) } - case api.Swarm: - case api.SwarmMode: - case api.DCOS: - if sc.agentPool.IsAvailabilitySets() { - return errors.Errorf("scaling isn't supported for orchestrator %q, with availability sets", orchestratorInfo.OrchestratorType) - } - transformer.NormalizeForVMSSScaling(sc.logger, templateJSON) } random := rand.New(rand.NewSource(time.Now().UnixNano())) diff --git a/docs/README.md b/docs/README.md index eea9185d4..bf9d83472 100644 --- a/docs/README.md +++ b/docs/README.md @@ -1,4 +1,4 @@ -# Microsoft Azure Container Service Engine - Builds Docker Enabled Clusters +# Microsoft Azure Kubernetes Engine - Builds Kubernetes Clusters ## Overview @@ -8,14 +8,11 @@ This cluster definition examples demonstrate how to create a customized Docker E * [AKS Engine](acsengine.md) - shows you how to build and use the AKS engine to generate custom Docker enabled container clusters * [Cluster Definition](clusterdefinition.md) - describes the components of the cluster definition file -* [DC/OS Walkthrough](dcos.md) - shows how to create a DC/OS enabled Docker cluster on Azure * [Kubernetes Walkthrough](kubernetes.md) - shows how to create a Kubernetes enabled Docker cluster on Azure * [Kubernetes Windows Walkthrough](kubernetes/windows.md) - shows how to create a hybrid Kubernetes Windows enabled Docker cluster on Azure. * [Kubernetes with GPU support Walkthrough](kubernetes/gpu.md) - shows how to create a Kubernetes cluster with GPU support. * [Kubernetes AAD integration Walkthrough](kubernetes/aad.md) - shows how to create a Kubernetes cluster with AAD as authentication provider. * [Kubernetes Monitoring Walkthrough](kubernetes/monitoring.md) - shows how to set up monitoring of your Kubernetes cluster -* [Swarm Walkthrough](swarm.md) - shows how to create a Swarm enabled Docker cluster on Azure -* [Swarm Mode Walkthrough](swarmmode.md) - shows how to create a Swarm Mode cluster on Azure * [Custom VNET](../examples/vnet) - shows how to use a custom VNET * [Attached Disks](../examples/disks-storageaccount) - shows how to attach up to 4 disks per node * [Managed Disks](../examples/disks-managed) (under private preview) - shows how to use managed disks diff --git a/docs/acsengine.md b/docs/acsengine.md index 410450768..d714dda01 100644 --- a/docs/acsengine.md +++ b/docs/acsengine.md @@ -1,6 +1,6 @@ -# Microsoft Azure Container Service Engine +# Microsoft Azure Kubernetes Engine -The Azure Container Service Engine (`aks-engine`) generates ARM (Azure Resource Manager) templates for Docker enabled clusters on Microsoft Azure with your choice of DCOS, [Kubernetes](kubernetes/deploy.md), or Swarm orchestrators. The input to aks-engine is a cluster definition file which describes the desired cluster, including orchestrator, features, and agents. The structure of the input files is very similar to the public API for Azure Container Service. +The Azure Kubernetes Engine (`aks-engine`) generates ARM (Azure Resource Manager) templates for Kubernetes clusters on Microsoft Azure. The input to aks-engine is a cluster definition file which describes the desired cluster, including orchestrator, features, and agents. The structure of the input files is very similar to the public API for Azure Kubernetes Service. diff --git a/docs/clusterdefinition.md b/docs/clusterdefinition.md index 00051e88e..a424233cc 100644 --- a/docs/clusterdefinition.md +++ b/docs/clusterdefinition.md @@ -1,4 +1,4 @@ -# Microsoft Azure Container Service Engine - Cluster Definition +# Microsoft Azure Kubernetes Engine - Cluster Definition ## Cluster Defintions for apiVersion "vlabs" @@ -22,10 +22,7 @@ Here are the cluster definitions for apiVersion "vlabs": Here are the valid values for the orchestrator types: -1. `DCOS` - this represents the [DC/OS orchestrator](dcos.md). [Older releases of DCOS 1.8 may be specified](../examples/dcos-releases). -2. `Kubernetes` - this represents the [Kubernetes orchestrator](kubernetes.md). -3. `Swarm` - this represents the [Swarm orchestrator](swarm.md). -4. `Swarm Mode` - this represents the [Swarm Mode orchestrator](swarmmode.md). +1. `Kubernetes` - this represents the [Kubernetes orchestrator](kubernetes.md). To learn more about supported orchestrators and versions, run the orchestrators command: @@ -529,7 +526,7 @@ We consider `kubeletConfig`, `controllerManagerConfig`, `apiServerConfig`, and ` | vnetCidr | no | Specifies the VNET cidr when using a custom VNET ([bring your own VNET examples](../examples/vnet)). This VNET cidr should include both the master and the agent subnets. | | imageReference.name | no | The name of the Linux OS image. Needs to be used in conjunction with resourceGroup, below | | imageReference.resourceGroup | no | Resource group that contains the Linux OS image. Needs to be used in conjunction with name, above | -| distro | no | Specifies the masters' Linux distribution. Currently supported values are: `ubuntu`, `aks`, `aks-docker-engine` and `coreos` (CoreOS support is currently experimental - [Example of CoreOS Master with CoreOS Agents](../examples/coreos/kubernetes-coreos.json)). For Azure Public Cloud, defaults to `aks` if undefined, unless GPU nodes are present, in which case it will default to `aks-docker-engine`. For Sovereign Clouds, the default is `ubuntu`. `aks` is a custom image based on `ubuntu` that comes with pre-installed software necessary for Kubernetes deployments (Azure Public Cloud only for now). **NOTE**: GPU nodes are currently incompatible with the default Moby container runtime provided in the `aks` image. Clusters containing GPU nodes will be set to use the `aks-docker-engine` distro which is functionally equivalent to `aks` with the exception of the docker distribution (see [GPU support Walkthrough](kubernetes/gpu.md) for details). Currently supported OS and orchestrator configurations -- `ubuntu` and `aks`: DCOS, Docker Swarm, Kubernetes; `coreos`: Kubernetes. [Example of CoreOS Master with CoreOS Agents](../examples/coreos/kubernetes-coreos.json) | +| distro | no | Specifies the masters' Linux distribution. Currently supported values are: `ubuntu`, `aks`, `aks-docker-engine` and `coreos` (CoreOS support is currently experimental - [Example of CoreOS Master with CoreOS Agents](../examples/coreos/kubernetes-coreos.json)). For Azure Public Cloud, defaults to `aks` if undefined, unless GPU nodes are present, in which case it will default to `aks-docker-engine`. For Sovereign Clouds, the default is `ubuntu`. `aks` is a custom image based on `ubuntu` that comes with pre-installed software necessary for Kubernetes deployments (Azure Public Cloud only for now). **NOTE**: GPU nodes are currently incompatible with the default Moby container runtime provided in the `aks` image. Clusters containing GPU nodes will be set to use the `aks-docker-engine` distro which is functionally equivalent to `aks` with the exception of the docker distribution (see [GPU support Walkthrough](kubernetes/gpu.md) for details). Currently supported OS and orchestrator configurations -- `ubuntu` and `aks`: Kubernetes; `coreos`: Kubernetes. [Example of CoreOS Master with CoreOS Agents](../examples/coreos/kubernetes-coreos.json) | | customFiles | no | The custom files to be provisioned to the master nodes. Defined as an array of json objects with each defined as `"source":"absolute-local-path", "dest":"absolute-path-on-masternodes"`.[See examples](../examples/customfiles) | | availabilityProfile | no | Supported values are `AvailabilitySet` (default) and `VirtualMachineScaleSets` (still under development: upgrade not supported; requires Kubernetes clusters version 1.10+ and agent pool availabilityProfile must also be `VirtualMachineScaleSets`). When MasterProfile is using `VirtualMachineScaleSets`, to SSH into a master node, you need to use `ssh -p 50001` instead of port 22. | | agentVnetSubnetId | only required when using custom VNET and when MasterProfile is using `VirtualMachineScaleSets` | Specifies the Id of an alternate VNET subnet for all the agent pool nodes. The subnet id must specify a valid VNET ID owned by the same subscription. ([bring your own VNET examples](../examples/vnet)). When MasterProfile is using `VirtualMachineScaleSets`, this value should be the subnetId of the subnet for all agent pool nodes. | @@ -558,7 +555,7 @@ A cluster can have 0 to 12 agent pool profiles. Agent Pool Profiles are used for | imageReference.name | no | The name of a a Linux OS image. Needs to be used in conjunction with resourceGroup, below | | imageReference.resourceGroup | no | Resource group that contains the Linux OS image. Needs to be used in conjunction with name, above | | osType | no | Specifies the agent pool's Operating System. Supported values are `Windows` and `Linux`. Defaults to `Linux` | -| distro | no | Specifies the agent pool's Linux distribution. Currently supported values are: `ubuntu`, `aks`, `aks-docker-engine` and `coreos` (CoreOS support is currently experimental - [Example of CoreOS Master with CoreOS Agents](../examples/coreos/kubernetes-coreos.json)). For Azure Public Cloud, defaults to `aks` if undefined, unless GPU nodes are present, in which case it will default to `aks-docker-engine`. For Sovereign Clouds, the default is `ubuntu`. `aks` is a custom image based on `ubuntu` that comes with pre-installed software necessary for Kubernetes deployments (Azure Public Cloud only for now). **NOTE**: GPU nodes are currently incompatible with the default Moby container runtime provided in the `aks` image. Clusters containing GPU nodes will be set to use the `aks-docker-engine` distro which is functionally equivalent to `aks` with the exception of the docker distribution (see [GPU support Walkthrough](kubernetes/gpu.md) for details). Currently supported OS and orchestrator configurations -- `ubuntu`: DCOS, Docker Swarm, Kubernetes; `coreos`: Kubernetes. [Example of CoreOS Master with Windows and Linux (CoreOS and Ubuntu) Agents](../examples/coreos/kubernetes-coreos-hybrid.json) | +| distro | no | Specifies the agent pool's Linux distribution. Currently supported values are: `ubuntu`, `aks`, `aks-docker-engine` and `coreos` (CoreOS support is currently experimental - [Example of CoreOS Master with CoreOS Agents](../examples/coreos/kubernetes-coreos.json)). For Azure Public Cloud, defaults to `aks` if undefined, unless GPU nodes are present, in which case it will default to `aks-docker-engine`. For Sovereign Clouds, the default is `ubuntu`. `aks` is a custom image based on `ubuntu` that comes with pre-installed software necessary for Kubernetes deployments (Azure Public Cloud only for now). **NOTE**: GPU nodes are currently incompatible with the default Moby container runtime provided in the `aks` image. Clusters containing GPU nodes will be set to use the `aks-docker-engine` distro which is functionally equivalent to `aks` with the exception of the docker distribution (see [GPU support Walkthrough](kubernetes/gpu.md) for details). Currently supported OS and orchestrator configurations -- `ubuntu`: Kubernetes; `coreos`: Kubernetes. [Example of CoreOS Master with Windows and Linux (CoreOS and Ubuntu) Agents](../examples/coreos/kubernetes-coreos-hybrid.json) | | acceleratedNetworkingEnabled | no | Use [Azure Accelerated Networking](https://azure.microsoft.com/en-us/blog/maximize-your-vm-s-performance-with-accelerated-networking-now-generally-available-for-both-windows-and-linux/) feature for Linux agents (You must select a VM SKU that supports Accelerated Networking). Defaults to `true` if the VM SKU selected supports Accelerated Networking | | acceleratedNetworkingEnabledWindows | no | Use [Azure Accelerated Networking](https://azure.microsoft.com/en-us/blog/maximize-your-vm-s-performance-with-accelerated-networking-now-generally-available-for-both-windows-and-linux/) feature for Windows agents (You must select a VM SKU that supports Accelerated Networking). Defaults to `false` | @@ -662,7 +659,7 @@ format for `keyvaultSecretRef.vaultId`, can be obtained in cli, or found in the ## Cluster Defintions for apiVersion "2016-03-30" -Here are the cluster definitions for apiVersion "2016-03-30". This matches the api version of the Azure Container Service Engine. +Here are the cluster definitions for apiVersion "2016-03-30". This matches the api version of the Azure Kubernetes Engine. ### apiVersion diff --git a/docs/clusterdefinition.zh-CN.md b/docs/clusterdefinition.zh-CN.md index 677447636..4e51c41b5 100644 --- a/docs/clusterdefinition.zh-CN.md +++ b/docs/clusterdefinition.zh-CN.md @@ -90,7 +90,7 @@ ## "2016-03-30"版本apiVersion的集群定义文件 -以下是"2016-03-30"版本apiVersion的集群定义文件,这个版本的api和Azure Container Service Engine的一致。 +以下是"2016-03-30"版本apiVersion的集群定义文件,这个版本的api和Azure Kubernetes Engine的一致。 ### apiVersion diff --git a/docs/contributing-dcos.md b/docs/contributing-dcos.md deleted file mode 100644 index a09ed2e16..000000000 --- a/docs/contributing-dcos.md +++ /dev/null @@ -1,210 +0,0 @@ -# Porting a new DC/OS version to AKS Engine - -## 1. Locate the official ARM Template - -Go to `https://dcos.io/docs/X.X/administration/installing/cloud/azure/`, where `X.X` should be replaced by the version you are looking to port. -In the documentation, you will the link to the ARM templates you are looking for. -The latest stable templates should be at `https://downloads.dcos.io/dcos/stable/azure.html` -Early Access at: `https://downloads.dcos.io/dcos/EarlyAccess/azure.html` -Etc. - -## 2. Find the package GUIDs - -Following the previous step, you should now have 3 ARM templates (1, 3 and 5 masters variants). -We now need to find the package GUID of each variant. -In each template you should find a string that looks like: `dcos-config--setup_`, this GUID is what we are looking for. -Extract the GUIDs from the 3 differents templates, and them in `engine.go/getPackageGUID` for your specific DC/OS version. - -In DC/OS 1.11 and greater, you should find a the contents for `/etc/mesosphere/setup-flags/repository-url` in each 3 ARM templates (1, 3 and 5 masters variants). -Extract the GUIDs from the 3 differents templates, and them in `dcos/dcoscustomdataXXX.t` for your specific DC/OS version. - - -## 3. Extract the cloud-config data from the template - -In one of the template (no matter which one), grab the data from the MasterVM.osProfile.customData. -If you remove the concat operation, you should end up which a big string of unescaped JSON. -Unescape it (for example using this [online tool](http://www.freeformatter.com/javascript-escape.html#ad-output)), and convert it to yaml (you can use [json2yaml](https://www.json2yaml.com/)). -You should now have a clean yaml. - -## 4. Create and customize the custom data file. - -under the `parts` directory, create a new file called `dcoscustomdataXXX.t` replacing `XXX` by the correct version number. -Paste the yaml from the previous step inside. - -In the new file, under the `runcmd` section you should find 4 sucessive `curl` calls downloading some `.deb` packages followed by a bash script installing each one of them. This is handled by `parts\dcos\dcosprovision.sh` in AKS Engine, so make sure the dependencies didn't change and replace the `curl` and `bash` calls by a link to the script. - -For example, in DC/OS 1.9: -```yaml -- curl -fLsSv --retry 20 -Y 100000 -y 60 -o /var/tmp/1.deb https://az837203.vo.msecnd.net/dcos-deps/libipset3_6.29-1_amd64.deb -- curl -fLsSv --retry 20 -Y 100000 -y 60 -o /var/tmp/2.deb https://az837203.vo.msecnd.net/dcos-deps/ipset_6.29-1_amd64.deb -- curl -fLsSv --retry 20 -Y 100000 -y 60 -o /var/tmp/3.deb https://az837203.vo.msecnd.net/dcos-deps/unzip_6.0-20ubuntu1_amd64.deb -- curl -fLsSv --retry 20 -Y 100000 -y 60 -o /var/tmp/4.deb https://az837203.vo.msecnd.net/dcos-deps/libltdl7_2.4.6-0.1_amd64.deb -- sed -i "s/^Port 22$/Port 22\nPort 2222/1" /etc/ssh/sshd_config -- service ssh restart -- bash -c "try=1;until dpkg -i /var/tmp/{1,2,3,4}.deb || ((try>9));do echo retry \$((try++));sleep - \$((try*try));done" -``` - -becomes - -```yaml -- /opt/azure/containers/provision.sh -``` - -Additional modifications under `runcmd`: -* Replace every occurence of the Package GUID (that we found in step 2) by `DCOSGUID`. -* the `content` of the cmd with path `/etc/mesosphere/setup-flags/late-config.yaml` should be modified to accept AKS Engine bindings instead of variable where needed (look at a previous custom data file for reference). -* At the very end of the file, replace -```yaml -- content: '' - path: "/etc/mesosphere/roles/master" -- content: '' - path: "/etc/mesosphere/roles/azure_master" -- content: '' - path: "/etc/mesosphere/roles/azure" -``` - -by - -```yaml -- content: '' - path: /etc/mesosphere/roles/azure -- content: 'PROVISION_STR' - path: "/opt/azure/containers/provision.sh" - permissions: "0744" - owner: "root" -``` - -## 5. Adding the support of the new version inside to .go files - -### pkg/engine/defaults.go - -- Around line 30, add your `DCOSXXXBootstrapDownloadURL` variable (replace XXX with the version number), inside the `fmt.Sprintf()` function replace the second and third parameters with the version `EA, Stable, Beta, ...` and the commit hash. - -> You can find the commit hash from the https://downloads.dcos.io/dcos/stable/X.XX.X/azure.html page. - -Example for version 1.10 -[https://downloads.dcos.io/dcos/stable/1.10.0/azure.html](https://downloads.dcos.io/dcos/stable/1.10.0/azure.html) - -``` -DCOS110BootstrapDownloadURL: fmt.Sprintf(AzureEdgeDCOSBootstrapDownloadURL, "stable", "e38ab2aa282077c8eb7bf103c6fff7b0f08db1a4"), -``` - -### pkg/engine/engine.go - -- Around line 39, add `dcosCustomDataXXX = "dcos/dcoscustomdataXXX.t"` variable - -Example for version 1.10: -``` -dcosCustomData110 = "dcos/dcoscustomdata110.t" -``` - -- Around line 578, add the code case block for your version. - -Example for version 1.10: -``` -case api.DCOSRelease1Dot10: - dcosBootstrapURL = cloudSpecConfig.DCOSSpecConfig.DCOS110BootstrapDownloadURL - ``` - -- Around line 1170, add your api case version. - - Example for version 1.10: - ``` - case api.DCOSRelease1Dot10: - switch masterCount { - case 1: - return "c4ec6210f396b8e435177b82e3280a2cef0ce721" - case 3: - return "08197947cb57d479eddb077a429fa15c139d7d20" - case 5: - return "f286ad9d3641da5abb622e4a8781f73ecd8492fa" - } - ``` - - > In the return function, paste the package GUID from the step 2 for each cases. - -- Around line 1558, add your api case version. - -Example for version 1.10: -``` - case api.DCOSRelease1Dot10: - yamlFilename = dcosCustomData110 -``` - -### pkg/engine/types.go - -- Around line 40, add your the type for your new version. - -Example for version 1.10 : -``` -DCOS110BootstrapDownloadURL string -``` - -### pkg/api/common/const.go - -- Around line 59, declare a new const with your `DCOSRelease` - -Example for version 1.10 : -``` -// DCOSRelease1Dot10 is the major.minor string prefix for 1.9 versions of DCOS -DCOSRelease1Dot10 string = "1.10" -``` - -- Around line 72, add your `DCOSReleaseToVersion` in the map - -Example for version 1.10 : -``` -DCOSRelease1Dot10: "1.10.0", -``` - -### pkg/api/const.go - -- Around line 76, add the const for your DCOS release - -Example for version 1.10 : -``` -// DCOSRelease1Dot10 is the major.minor string prefix for 1.10 versions of DCOS -DCOSRelease1Dot10 string = "1.10" -``` - -### pkg/api/convertertoapi.go - -- Around line 572 and 601 (two places) add the case for your release - -Example for version 1.10 : -``` -case DCOSRelease1Dot10, DCOSRelease1Dot9, DCOSRelease1Dot8: -``` -``` -case DCOSRelease1Dot10, DCOSRelease1Dot9, DCOSRelease1Dot8, DCOSRelease1Dot7: -``` - -### pkg/api/v20170701/validate.go - -- Around line 33, add the case for your release - -Example for version 1.10 : -``` -case common.DCOSRelease1Dot10: -``` - -### pkg/api/vlabs/validate.go - -- Around line 37, add the case for your release - -Example for version 1.10 : -``` -case common.DCOSRelease1Dot10: -``` - - -## Conclusion - -We encourage you to look at previous PR as example, listed bellow : - -- [Adding DC/OS 1.10 stable version support #1439](https://github.com/Azure/aks-engine/pull/1439/files) -- [setting dcos test to 1.9 (current default)](https://github.com/Azure/aks-engine/pull/1443) -- [[DC/OS] Set 1.9 as default DCOS version and upgrade Packages](https://github.com/Azure/aks-engine/pull/457) -- [[DC/OS] Add support for DCOS 1.9 EA](https://github.com/Azure/aks-engine/pull/360) -- [DCOS 1.8.8 Support](https://github.com/Azure/aks-engine/pull/278) diff --git a/docs/dcos.md b/docs/dcos.md deleted file mode 100644 index 6b22116df..000000000 --- a/docs/dcos.md +++ /dev/null @@ -1,147 +0,0 @@ -# Microsoft Azure Container Service Engine - DC/OS Walkthrough - -### `Note:` -Support for DC/OS `1.11` and later continues in the forked project [dcos-engine](https://github.com/Azure/dcos-engine). - -## Deployment - -Here are the steps to deploy a simple DC/OS cluster: - -1. [install aks-engine](acsengine.md#downloading-and-building-aks-engine) -2. [generate your ssh key](ssh.md#ssh-key-generation) -3. edit the [DC/OS example](../examples/dcos.json) and fill in the blank strings -4. [generate the template](acsengine.md#generate-templates) -5. [deploy the output azuredeploy.json and azuredeploy.parameters.json](acsengine.md#deploy-templates) - -## Walkthrough - -Once your DC/OS cluster has deployed you will have a resource group containing: - -1. a set of 1,3, or 5 masters in a master specific availability set. Each master's SSH can be accessed via the public dns address at ports 2200..2204 - -2. a set of public agents in an Virtual Machine Scale Set (VMSS). The agent VMs can be accessed through a master. See [agent forwarding](ssh.md#key-management-and-agent-forwarding-with-windows-pageant) for an example of how to do this. - -3. a set of private agents in an Virtual Machine Scale Set (VMSS). - -The following image shows the architecture of a container service cluster with 3 masters, and 6 agents: - -![Image of DC/OS container service on azure](images/dcos.png) - -In the image above, you can see the following parts: - -1. **Admin Router on port 80** - The admin router enables you to access all DC/OS services. For example, if you create an SSH tunnel to port 80 you can access the services on the following urls, you can see the DC/OS dashboard by browsing to -2. **Masters** - Masters run the DC/OS processes that schedule and manage workloads on the agent nodes. -3. **Public Agents** - Public agents, deployed in a VM scale set, are publicly accessible through the Azure Load Balancer to ports 80, 443, and 8080. Jobs can be assigned to public agents using role `slave_public`. -4. **Private Agents** - Private agents, deployed in a VM scale set, are not publicly accessible. Workloads are scheduled to private agents by default. -5. **Docker on port 2375** - The Docker engine runs containerized workloads and each Agent runs the Docker engine. DC/OS runs Docker workloads, and examples on how to do this are provided in the Marathon walkthrough sections of this readme. - -All VMs are in the same VNET where the masters are on private subnet 172.16.0.0/24 and the agents are on the private subnet, 10.0.0.0/8, and fully accessible to each other. - -## Create your First Three DC/OS Services: hello-world, Docker app, and Docker web app - -This walk through is inspired by the wonderful digital ocean tutorial: https://www.digitalocean.com/community/tutorials/how-to-configure-a-production-ready-mesosphere-cluster-on-ubuntu-14-04. After completing this walkthrough you will know how to: - * access DC/OS dashboard for cluster health, - * deploy a simple hello-world app, - * deploy a simple docker app, - * look at logs of your workload, - * and deploy a simple web app publicly available to the world. - - - 1. After successfully deploying the template write down the two output master and agent FQDNs (Fully Qualified Domain Name). - 1. If using Powershell or CLI, the output parameters are in the OutputsString section named 'agentFQDN' and 'masterFQDN' - 2. If using Portal, to get the output you need to: - 1. navigate to "resource group" - 2. click on the resource group you just created - 3. then click on "Succeeded" under *last deployment* - 4. then click on the "Microsoft.Template" - 5. now you can copy the output FQDNs and sample SSH commands - ![Image of docker scaling](images/findingoutputs.png) - - 2. Create an [SSH tunnel to port 80](ssh.md#create-port-80-tunnel-to-the-master) on the master FQDN. - - 3. browse to the DC/OS UI . This displays the main DC/OS dashboard: - - 4. The front page shows the DC/OS Dashboard: - 1. Scroll down to see your CPU, Memory and Disk Allocation. This also shows you services, node, and component health. - - ![Image of the DC/OS dashboard](images/dcosdashboard.png) - - 2. On the left side click "Services" - - ![Image of DC/OS services on Azure](images/dcosservices.png) - - 3. start a long running service - 1. click "Deploy Service" - 2. type "myfirstapp" for the id - 3. type `/bin/bash -c 'for i in {1..5}; do echo MyFirstApp $i; sleep 1; done'` for the command - 4. scroll to bottom and click Deploy - - ![Image of Deploy New Service dialog](images/deployfirstapp.png) - - 5. you will notice the new app change state from not running to running - - ![Image of the new application status](images/dcos-newapp-status.png) - - 6. To run a Docker app browse back to Services, and click "Deploy Service" and set id to "/helloworld": - - ![Image of setting up docker application dialog 1](images/dcos-docker-helloworld1.png) - - 7. Click "Container Settings", type `hello-world` for image and click "Deploy" - - ![Image of setting up docker application dialog 2](images/dcos-docker-helloworld2.png) - - 8. Once deployed, click on the "helloworld" service, and you will see all the finished tasks: - - ![Image of helloworld tasks](images/dcos-docker-helloworld-tasks.png) - - 9. Click on the most recent finished tasks, and click "Logs" and you will see the "Hello from Docker!" message: - - ![Image of helloworld tasks](images/dcos-docker-helloworld-logs.png) - - 10. The next step is to deploy a docker web app accessible to the world. The public agents have a load balancer exposing port 80, 443, and 8080. On the DC/OS page, browse back to Services, and click "Deploy Service" and set id to "/simpleweb": - - ![Image of docker web app](images/dcos-simpleweb1.png) - - 11. On left, click "Container Settings" and container image "yeasy/simple-web". This is the image that will be downloaded from DockerHub - - ![Image of docker web app](images/dcos-simpleweb2.png) - - 12. Next on left, click "Network" and type in port 80. This is how you expose port 80 to the world. - - ![Image of docker web app](images/dcos-simpleweb3.png) - - 13. Next on left, click "Optional" and set role type "slave_public". This ensures the Docker web app is running on the public agent. - - ![Image of docker web app](images/dcos-simpleweb4.png) - - 14. Finally click deploy and watch the web app deploy. Once it goes to running state, open the FQDN retrieved in step 1 during deployment, and you will see the web app. - - ![Image of web app](images/simpleweb.png) - -# DCOS upgrade - -Starting from DC/OS 1.11, aks-engine deploys a bootstrap node as part of DC/OS cluster. This enables upgrade operation on an existing cluster. - -To start the upgrade, run this following command: -``` -aks-engine dcos-upgrade \ - --subscription-id \ - --resource-group \ - --location \ - --upgrade-version \ - --deployment-dir \ - --ssh-private-key-path -``` -The upgrade is an idempotent operation. If failed, it could be re-run and will pick the execution from the last successful checkpoint. - -# Learning More - -Here are recommended links to learn more about DC/OS: - -1. [Azure DC/OS documentation](https://azure.microsoft.com/en-us/documentation/services/container-service/) - -## DC/OS Community Documentation - -1. [DC/OS Overview](https://dcos.io/docs/1.8/overview/) - provides overview of DC/OS, Architecture, Features, and Concepts. - -2. [DC/OS Tutorials](https://docs.mesosphere.com/1.8/usage/tutorials/) - provides various tutorials for DC/OS. diff --git a/docs/design/proposed-template-refactor.md b/docs/design/proposed-template-refactor.md index ba90a58e3..7d2b22934 100644 --- a/docs/design/proposed-template-refactor.md +++ b/docs/design/proposed-template-refactor.md @@ -1,6 +1,6 @@ # Acs-engine -The Azure Container Service Engine (aks-engine) is a command line tool that generates ARM (Azure Resource Manager) templates in order for one to deploy container-based clusters (like Kubernetes , DCOS, Openshift, Docker swarm) on the Azure platform. +The Azure Kubernetes Engine (aks-engine) is a command line tool that generates ARM (Azure Resource Manager) templates in order for one to deploy container-based clusters (like Kubernetes , DCOS, Openshift, Docker swarm) on the Azure platform. This design document provides a brief and high-level overview of what aks-engine does internally to achieve deployment of containerized clusters. The scope of this document will be limited to the execution of aks-engine when creating Kubernetes clusters. diff --git a/docs/developers.md b/docs/developers.md index 781d8a0fe..4f05fff9d 100644 --- a/docs/developers.md +++ b/docs/developers.md @@ -81,8 +81,8 @@ Unit tests may be run locally via `make test`. ### End-to-end Tests -End-to-end tests for the DCOS and Kubernetes orchestrators may be run -via `make test-{dcos,kubernetes}`. The test process can optionally +End-to-end tests for Kubernetes may be run +via `make test-kubernetes`. The test process can optionally deploy and tear down a cluster as part of the test (this is enabled by default). You'll need access to an Azure subscription, as well as at least the following environment variables to be set: diff --git a/docs/extensions.md b/docs/extensions.md index 98eaf7698..a8865291f 100644 --- a/docs/extensions.md +++ b/docs/extensions.md @@ -1,4 +1,4 @@ -# Microsoft Azure Container Service Engine - Extensions +# Microsoft Azure Kubernetes Engine - Extensions Extensions in aks-engine provide an easy way for aks-engine users to add pre-packaged functionality into their cluster. For example, an extension could configure a monitoring solution on an AKS cluster. The user would not need to know the details of how to install the monitoring solution. Rather, the user would simply add the extension into the extensionProfiles section of the template. diff --git a/docs/images/dcos-add-file-json.png b/docs/images/dcos-add-file-json.png deleted file mode 100644 index d550b417f..000000000 Binary files a/docs/images/dcos-add-file-json.png and /dev/null differ diff --git a/docs/images/dcos-create-service-from-reg.png b/docs/images/dcos-create-service-from-reg.png deleted file mode 100644 index 69cd43c8e..000000000 Binary files a/docs/images/dcos-create-service-from-reg.png and /dev/null differ diff --git a/docs/images/dcos-create-service-json.png b/docs/images/dcos-create-service-json.png deleted file mode 100644 index d550b417f..000000000 Binary files a/docs/images/dcos-create-service-json.png and /dev/null differ diff --git a/docs/images/dcos-create-service.png b/docs/images/dcos-create-service.png deleted file mode 100644 index 69cd43c8e..000000000 Binary files a/docs/images/dcos-create-service.png and /dev/null differ diff --git a/docs/images/dcos-docker-helloworld-logs.png b/docs/images/dcos-docker-helloworld-logs.png deleted file mode 100644 index de3df374a..000000000 Binary files a/docs/images/dcos-docker-helloworld-logs.png and /dev/null differ diff --git a/docs/images/dcos-docker-helloworld-tasks.png b/docs/images/dcos-docker-helloworld-tasks.png deleted file mode 100644 index f0883d5c8..000000000 Binary files a/docs/images/dcos-docker-helloworld-tasks.png and /dev/null differ diff --git a/docs/images/dcos-docker-helloworld1.png b/docs/images/dcos-docker-helloworld1.png deleted file mode 100644 index bfbfa1787..000000000 Binary files a/docs/images/dcos-docker-helloworld1.png and /dev/null differ diff --git a/docs/images/dcos-docker-helloworld2.png b/docs/images/dcos-docker-helloworld2.png deleted file mode 100644 index 62e8a4062..000000000 Binary files a/docs/images/dcos-docker-helloworld2.png and /dev/null differ diff --git a/docs/images/dcos-newapp-status.png b/docs/images/dcos-newapp-status.png deleted file mode 100644 index 8d89b8ef6..000000000 Binary files a/docs/images/dcos-newapp-status.png and /dev/null differ diff --git a/docs/images/dcos-running-service-from-reg-files.png b/docs/images/dcos-running-service-from-reg-files.png deleted file mode 100644 index 50e620aac..000000000 Binary files a/docs/images/dcos-running-service-from-reg-files.png and /dev/null differ diff --git a/docs/images/dcos-running-service-from-reg.png b/docs/images/dcos-running-service-from-reg.png deleted file mode 100644 index 2d727c553..000000000 Binary files a/docs/images/dcos-running-service-from-reg.png and /dev/null differ diff --git a/docs/images/dcos-simpleweb1.png b/docs/images/dcos-simpleweb1.png deleted file mode 100644 index 5afa5c31a..000000000 Binary files a/docs/images/dcos-simpleweb1.png and /dev/null differ diff --git a/docs/images/dcos-simpleweb2.png b/docs/images/dcos-simpleweb2.png deleted file mode 100644 index 235750a92..000000000 Binary files a/docs/images/dcos-simpleweb2.png and /dev/null differ diff --git a/docs/images/dcos-simpleweb3.png b/docs/images/dcos-simpleweb3.png deleted file mode 100644 index b1ca3112b..000000000 Binary files a/docs/images/dcos-simpleweb3.png and /dev/null differ diff --git a/docs/images/dcos-simpleweb4.png b/docs/images/dcos-simpleweb4.png deleted file mode 100644 index 484afaef8..000000000 Binary files a/docs/images/dcos-simpleweb4.png and /dev/null differ diff --git a/docs/images/dcos.png b/docs/images/dcos.png deleted file mode 100644 index f6a3dd724..000000000 Binary files a/docs/images/dcos.png and /dev/null differ diff --git a/docs/images/dcosdashboard.png b/docs/images/dcosdashboard.png deleted file mode 100644 index 4a68d4c6f..000000000 Binary files a/docs/images/dcosdashboard.png and /dev/null differ diff --git a/docs/images/dcosservices.png b/docs/images/dcosservices.png deleted file mode 100644 index c17cdc348..000000000 Binary files a/docs/images/dcosservices.png and /dev/null differ diff --git a/docs/images/swarm.png b/docs/images/swarm.png deleted file mode 100644 index accb9dfb3..000000000 Binary files a/docs/images/swarm.png and /dev/null differ diff --git a/docs/images/swarmbrowser.png b/docs/images/swarmbrowser.png deleted file mode 100644 index 1263a29d6..000000000 Binary files a/docs/images/swarmbrowser.png and /dev/null differ diff --git a/docs/images/swarmmode-hybrid-docker-node-inspect.png b/docs/images/swarmmode-hybrid-docker-node-inspect.png deleted file mode 100644 index 6d7787ec8..000000000 Binary files a/docs/images/swarmmode-hybrid-docker-node-inspect.png and /dev/null differ diff --git a/docs/images/swarmmode-hybrid-docker-node-ls.png b/docs/images/swarmmode-hybrid-docker-node-ls.png deleted file mode 100644 index dc1a2e1f8..000000000 Binary files a/docs/images/swarmmode-hybrid-docker-node-ls.png and /dev/null differ diff --git a/docs/images/swarmmode-hybrid-linux-agents.png b/docs/images/swarmmode-hybrid-linux-agents.png deleted file mode 100644 index 0c817fab4..000000000 Binary files a/docs/images/swarmmode-hybrid-linux-agents.png and /dev/null differ diff --git a/docs/images/swarmmode-hybrid-service-ls.png b/docs/images/swarmmode-hybrid-service-ls.png deleted file mode 100644 index c2e922806..000000000 Binary files a/docs/images/swarmmode-hybrid-service-ls.png and /dev/null differ diff --git a/docs/images/swarmmode-hybrid-stack-deploy.png b/docs/images/swarmmode-hybrid-stack-deploy.png deleted file mode 100644 index 5ca00370b..000000000 Binary files a/docs/images/swarmmode-hybrid-stack-deploy.png and /dev/null differ diff --git a/docs/kubernetes.md b/docs/kubernetes.md index bf96faa76..08ca3c929 100644 --- a/docs/kubernetes.md +++ b/docs/kubernetes.md @@ -1,4 +1,4 @@ -# Microsoft Azure Container Service Engine - Kubernetes +# Microsoft Azure Kubernetes Engine - Kubernetes * Create a Kubernetes Cluster * [Linux](kubernetes/deploy.md) - Create your first Linux Kubernetes cluster diff --git a/docs/kubernetes/aad.md b/docs/kubernetes/aad.md index ac8a299ce..f42269eed 100644 --- a/docs/kubernetes/aad.md +++ b/docs/kubernetes/aad.md @@ -1,4 +1,4 @@ -# Microsoft Azure Container Service Engine - Kubernetes AAD integration Walkthrough +# Microsoft Azure Kubernetes Engine - Kubernetes AAD integration Walkthrough This is walkthrough is to help you get start with Azure Active Directory(AAD) integeration with an AKS Engine Kubernetes cluster. diff --git a/docs/kubernetes/gpu.md b/docs/kubernetes/gpu.md index 99c08c23a..66a2fcb07 100644 --- a/docs/kubernetes/gpu.md +++ b/docs/kubernetes/gpu.md @@ -1,4 +1,4 @@ -# Microsoft Azure Container Service Engine - Using GPUs with Kubernetes +# Microsoft Azure Kubernetes Engine - Using GPUs with Kubernetes If you created a Kubernetes cluster with one or multiple agent pool(s) whose VM size is `Standard_NC*` or `Standard_NV*` you can schedule GPU workload on your cluster. The NVIDIA drivers are automatically installed on every GPU agent in your cluster, so you don't need to do that manually, unless you require a specific version of the drivers. Currently, the installed driver is version 396.26. @@ -97,4 +97,4 @@ We specify `nvidia.com/gpu: 1` or `alpha.kubernetes.io/nvidia-gpu: 1` in the res ## Known incompatibilty with Moby -GPU nodes are currently incompatible with the default Moby container runtime provided in the default `aks` image. Clusters containing GPU nodes will be set to use Docker Engine instead of Moby. \ No newline at end of file +GPU nodes are currently incompatible with the default Moby container runtime provided in the default `aks` image. Clusters containing GPU nodes will be set to use Docker Engine instead of Moby. diff --git a/docs/serviceprincipal.md b/docs/serviceprincipal.md index 9453b1760..83e4621ed 100644 --- a/docs/serviceprincipal.md +++ b/docs/serviceprincipal.md @@ -1,4 +1,4 @@ -# Microsoft Azure Container Service Engine +# Microsoft Azure Kubernetes Engine ## Service Principals diff --git a/docs/ssh.md b/docs/ssh.md index 939a26e37..ddb4fbb7b 100644 --- a/docs/ssh.md +++ b/docs/ssh.md @@ -1,4 +1,4 @@ -# Microsoft Azure Container Service Engine - SSH +# Microsoft Azure Kubernetes Engine - SSH # SSH Key Management diff --git a/docs/swarm.md b/docs/swarm.md deleted file mode 100644 index 92f622bb4..000000000 --- a/docs/swarm.md +++ /dev/null @@ -1,85 +0,0 @@ -# Microsoft Azure Container Service Engine - Swarm Walkthrough - -## Deployment - -Here are the steps to deploy a simple Swarm cluster: - -1. [Install aks-engine](acsengine.md#downloading-and-building-aks-engine) -2. [Generate your SSH key](ssh.md#ssh-key-generation) -3. [Edit the Swarm example](../examples/swarm.json) and fill in the blank strings -4. [Generate the template](acsengine.md#generate-templates) -5. [Deploy the output azuredeploy.json and azuredeploy.parameters.json](../docs/acsengine.md#deploy-templates) - -## Walkthrough - -Once your Swarm cluster has been deployed you will have a resource group containing: - -1. a set of 1,3, or 5 masters in a master availability set. Each master's SSH can be accessed via the public dns address at ports 2200..2204. First master's SSH can also be accessed via public dns address on port 22. - -2. a set of agents in a VM scale set (VMSS). The agent VMs can be accessed through a master. See [agent forwarding](ssh.md#key-management-and-agent-forwarding-with-windows-pageant) for an example of how to do this. - -The following image shows the architecture of a container service cluster with 3 masters, and 3 agents: - - ![Image of Swarm container service on azure](images/swarm.png) - - All VMs are in the same VNET where the masters are on private subnet 172.16.0.0/24 and the agents are on the private subnet, 10.0.0.0/16, and fully accessible to each other. - -## Create your First Two Swarm Docker Applications: hello-world, and Docker web app - -After completing this walkthrough you will know how to: - * display information from Swarm, - * deploy a simple Docker hello-world app using docker-compose, - * and deploy a simple Docker web app publically available to the world. - - - 1. After successfully deploying the template write down the two output master and agent FQDNs (Fully Qualified Domain Name). - 1. If using Powershell or CLI, the output parameters are the last values printed. - 2. If using Portal, to get the output you need to: - 1. navigate to "resource group" - 2. click on the resource group you just created - 3. then click on "Succeeded" under *last deployment* - 4. then click on the "Microsoft.Template" - 5. now you can copy the output FQDNs and sample SSH commands - - ![Image of docker scaling](images/findingoutputs.png) - - 2. SSH to port 2200 of the master FQDN. See [agent forwarding](ssh.md#key-management-and-agent-forwarding-with-windows-pageant) for an example of how to do this. - - 3. Set the DOCKER_HOST environment variable to `:2375`: e.g. ```export DOCKER_HOST=:2375``` - - 4. Type `docker info` to see the status of the agent nodes. - ![Image of docker info](images/dockerinfo.png) - - 5. Type `docker run -it hello-world` to see the hello-world test app run on one of the agents (the '-it' switches ensure output is displayed on your client) - - 6. Now let's create a simple web app and expose to the world. Start by using your favorite linux file editor to create a file named `docker-compose.yml` with the following contents: - ``` - web: - image: "yeasy/simple-web" - ports: - - "80:80" - restart: "always" - ``` - 7. type `docker-compose up -d` to create the simple web server. This will take a few minutes to pull the image - - 8. once completed, type `docker ps` to see the running image. - - ![Image of docker ps](images/dockerps.png) - - 9. in your web browser hit the AGENTFQDN endpoint (**not the master FQDN**) you recorded in step #1 and you should see the following page, with a counter that increases on each refresh. - - ![Image of the web page](images/swarmbrowser.png) - - 10. You can now scale the web application. For example, if you have 3 agents, you can type `docker-compose scale web=3`, and this will scale to the rest of your agents. Note that in this example you can only scale up to the number of agents that you have since each container requires port 80, so if you deployed a single agent, you won't be able to scale up. The Azure load balancer will automatically pick up the new containers. - - ![Image of docker scaling](images/dockercomposescale.png) - -# Learning More - -Here are recommended links to learn more about Swarm, Docker, and Docker Compose: - -1. [Docker](https://docs.docker.com/) - learn more through Docker documentation. - -2. [Docker Swarm](https://docs.docker.com/swarm/overview/) - learn more about Docker Swarm. - -3. [Docker Compose](https://docs.docker.com/compose/overview/) - Learn more about Docker Compose. diff --git a/docs/swarmmode-hybrid.md b/docs/swarmmode-hybrid.md deleted file mode 100644 index f0ae08b88..000000000 --- a/docs/swarmmode-hybrid.md +++ /dev/null @@ -1,89 +0,0 @@ -# Microsoft Azure Container Service Engine - Hybrid Swarm Mode Walkthrough - -## Deployment - -Here are the steps to deploy a Hybrid Swarm Mode cluster: - -1. [Install aks-engine](acsengine.md#downloading-and-building-aks-engine) -2. [Generate your ssh key](ssh.md#ssh-key-generation) -3. [Edit the Hybrid Swarm Mode example](../examples/windows/swarmmode-hybrid.json) and fill in the blank strings -4. [Generate the template](acsengine.md#generate-templates) -5. [Deploy the output azuredeploy.json and azuredeploy.parameters.json](../README.md#deploy-templates) - -## Walkthrough - -After you edit the template with your values and deploy, you should have: -- 3 Linux masters -- 3 Linux agents -- 3 Windows agents (with Windows Server 2016 with Containers), -all in the same Swarm. - -SSH into one of the masters (`ssh yourlinuxuser@masterfqdn.yourregion.cloudapp.azure.com -p 220x`, where x is the number of your master instance - 0,1,2 in the default case) and list all nodes: `docker node ls`. The output should be similar to this: - -![](images/swarmmode-hybrid-docker-node-ls.png) - -> NOTE - if you only see the Linux masters and agents, a working solution is to reimage the Windows agents scale set - that is restoring the VMs to the initial state and restart them. This will reapply all the steps in the installation, [mainly this one that installs the container host and joins the Swarm](https://github.com/Azure/aks-engine/blob/master/parts/swarm/Install-ContainerHost-And-Join-Swarm.ps1). - -Now you can inspect one of the Windows agents with `docker node inspect `: - -![](images/swarmmode-hybrid-docker-node-inspect.png) - - -##Limitations - -As the [Windows Server Containers documentation](https://docs.microsoft.com/en-us/virtualization/windowscontainers/manage-containers/swarm-mode#limitations) states, at the moment there are a few limitations to Swarm Mode with Windows hosts. - -The most important is that the routing mesh is not available for Windows Server at the moment, but you can publish ports on the host (`docker service create --publish mode=host`) - - -## Create your first hybrid deployment on the Swarm - -Now that you have a functional Hybrid Swarm Mode cluster in Azure, it is time to deploy a hybrid application: a Python front-end that will run on Linux, with a Redis data store on Windows. Here is the stack file for our services: - -``` -version: "3" -services: - - redis: - image: redis:3.2.100-nanoserver - deploy: - placement: - constraints: [node.platform.os == windows] - - python-web: - image: radumatei/python-web - ports: - - "80:80" -``` - -> [The Python application can be found here](https://github.com/microsoft-dx/docker-lab/tree/master/apps/python-redis) and is very similar to the [Docker Compose one from the Official Docker Docs](https://docs.docker.com/compose/gettingstarted/) - -On one of the masters create the file above and name it `hybrid-stack.yml`. In order to deploy it, execute: `docker stack deploy --compose-file hybrid-stack.yml python-redis`: - - -![](images/swarmmode-hybrid-stack-deploy.png) - -Now if you execute `docker service ls` you should see the two services: - -![](images/swarmmode-hybrid-service-ls.png) - -[Since the Nanoserver Redis image](https://hub.docker.com/r/library/redis/) is around 340 MB, it will take a little to pull it, then start a container. -After the container started, we can go to the Linux agents FQDN (the one you setup when editing the `swarmmode-hybrid.json` file) and access it from a browser: - -> Note that on the first run it might take a little while - -![](images/swarmmode-hybrid-linux-agents.png) - -## Learning more - -Here are recommended links to learn more about Swarm Mode, Docker, and Docker Compose: - -1. [Docker](https://docs.docker.com/) - learn more through Docker documentation. - -2. [Docker Swarm Mode](https://docs.docker.com/engine/swarm/) - learn more about Docker Swarm Mode. - -For hybrid swarms, you can check the following resources: - -3. Use Docker Swarm to run a Windows+Linux containerized application - [Part 1](https://www.youtube.com/watch?v=ZfMV5JmkWCY&t=170s), [Part 2](https://www.youtube.com/watch?v=VbzwKbcC_Mg&t=406s), [Part 3](https://www.youtube.com/watch?v=I9oDD78E_1E&t=354s) - -4. [The Hybrid Swarm: Running Windows and Linux Apps in one Docker Cluster - Talk by Elton Stoneman, Docker Captain](https://channel9.msdn.com/Events/DXPortugal/OSCAMP-Open-Source-Software-powered-by-Bright-Pixel/The-Hybrid-Swarm-Running-Windows-and-Linux-Apps-in-one-Docker-Cluster) diff --git a/docs/swarmmode.md b/docs/swarmmode.md deleted file mode 100644 index 37747586f..000000000 --- a/docs/swarmmode.md +++ /dev/null @@ -1,73 +0,0 @@ -# Microsoft Azure Container Service Engine - Swarm Mode Walkthrough - -## Deployment - -Here are the steps to deploy a simple Swarm Mode cluster: - -1. [Install aks-engine](acsengine.md#downloading-and-building-aks-engine) -2. [Generate your ssh key](ssh.md#ssh-key-generation) -3. [Edit the Swarm Mode example](../examples/swarmmode.json) and fill in the blank strings -4. [Generate the template](acsengine.md#generate-templates) -5. [Deploy the output azuredeploy.json and azuredeploy.parameters.json](../docs/acsengine.md#deploy-templates) - -## Walkthrough - -Once your Swarm Mode cluster has been deployed you will have a resource group containing: - -1. a set of 1,3, or 5 masters in a master availability set. Each master's SSH can be accessed via the public dns address at ports 2200..2204. First master's SSH can also be accessed via public dns address on port 22. - -2. a set of agents in a VM scale set (VMSS). The agent VMs can be accessed through a master. See [agent forwarding](ssh.md#key-management-and-agent-forwarding-with-windows-pageant) for an example of how to do this. - -The following image shows the architecture of a container service cluster with 3 masters, and 3 agents: - - ![Image of Swarm container service on azure](images/swarm.png) - - All VMs are in the same VNET where the masters are on private subnet 172.16.0.0/24 and the agents are on the private subnet, 10.0.0.0/16, and fully accessible to each other. - -## Create your First Two Swarm Mode Docker services: hello-world, and Docker web app - -After completing this walkthrough you will know how to: - * display information from Swarm Mode, - * deploy a simple Docker hello-world app using docker-compose, - * and deploy a simple Docker web app publically available to the world. - - - 1. After successfully deploying the template write down the two output master and agent FQDNs (Fully Qualified Domain Name). - 1. If using Powershell or CLI, the output parameters are the last values printed. - 2. If using Portal, to get the output you need to: - 1. navigate to "resource group" - 2. click on the resource group you just created - 3. then click on "Succeeded" under *last deployment* - 4. then click on the "Microsoft.Template" - 5. now you can copy the output FQDNs and sample SSH commands - - ![Image of docker scaling](images/findingoutputs.png) - - 2. SSH to port 2200 of the master FQDN (or first master's SSH can also be accessed via public dns address on port 22.). See [agent forwarding](ssh.md#key-management-and-agent-forwarding-with-windows-pageant) for an example of how to do this. - - 3. Type `docker node ls` to view the list of nodes (and their status) in the Swarm. - ![Image of docker node ls](images/dockernodels.png) - - 4. Type `docker run -it hello-world` to see the hello-world test app run on one of the agents (the '-it' switches ensure output is displayed on your client) - - 5. Now let's create a simple service in a swarm and expose it to the world. Type `docker service create --name fe --publish 80:80 yeasy/simple-web` - - 6. Once completed, type `docker service ps fe` to see the running service. - - ![Image of docker service ps](images/dockerserviceps.png) - - 7. In your web browser hit the AGENTFQDN endpoint (**not the master FQDN**) you recorded in step #1 and you should see the following page, with a counter that increases on each refresh. - - ![Image of the web page](images/swarmbrowser.png) - - 8. You can now scale the service. You can type `docker service scale fe=5`, and this will scale up the service to the desired number of replicas. - - ![Image of service scaling](images/dockerservicescale.png) - -# Learning More - -Here are recommended links to learn more about Swarm Mode, Docker, and Docker Compose: - -1. [Docker](https://docs.docker.com/) - learn more through Docker documentation. - -2. [Docker Swarm Mode](https://docs.docker.com/engine/swarm/) - learn more about Docker Swarm Mode. diff --git a/examples/README.md b/examples/README.md index 4f6f7c243..62dae8a12 100644 --- a/examples/README.md +++ b/examples/README.md @@ -1,4 +1,4 @@ -# Microsoft Azure Container Service Engine - Builds Docker Enabled Clusters +# Microsoft Azure Kubernetes Engine - Builds Kubernetes Clusters ## Overview diff --git a/examples/customfiles/README.md b/examples/customfiles/README.md index adc69f4a9..4d26ff3bc 100644 --- a/examples/customfiles/README.md +++ b/examples/customfiles/README.md @@ -1,4 +1,4 @@ -# Microsoft Azure Container Service Engine - Provisioning of master node custom files +# Microsoft Azure Kubernetes Engine - Provisioning of master node custom files ## Overview diff --git a/examples/dcos-D2.json b/examples/dcos-D2.json deleted file mode 100644 index 84eae3280..000000000 --- a/examples/dcos-D2.json +++ /dev/null @@ -1,41 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2" - }, - "agentPoolProfiles": [ - { - "name": "agentprivate", - "count": 1, - "vmSize": "Standard_D2" - }, - { - "name": "agentpublic", - "count": 1, - "vmSize": "Standard_D2", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} diff --git a/examples/dcos-attributes/README.md b/examples/dcos-attributes/README.md deleted file mode 100644 index 185c268e0..000000000 --- a/examples/dcos-attributes/README.md +++ /dev/null @@ -1,26 +0,0 @@ -# DCOS Agent Node Attributes - -Attributes can be defined for each agent node type. -The attributes can then be used with Marathon deployments as [placement contraints](https://mesosphere.github.io/marathon/docs/constraints.html). - -Attributes can easily be defined in AgentPoolProfile property of the API Model - -The definition below adds 2 attributes `"foo"` and `"att1"` to all nodes in the `agentprivate` pool. - -``` - "agentPoolProfiles": [ - { - "name": "agentprivate", - "count": 3, - "vmSize": "Standard_D2_v2", - "customNodeLabels" : { - "foo" : "bar", - "att1" : "value1" - } - } - ] -``` - -You can confirm the attributes on the Node Details: - -![Node UI Details](images/dcosattributes.png) \ No newline at end of file diff --git a/examples/dcos-attributes/dcos.json b/examples/dcos-attributes/dcos.json deleted file mode 100644 index 1ef14c6cf..000000000 --- a/examples/dcos-attributes/dcos.json +++ /dev/null @@ -1,45 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "xtentprivate", - "count": 3, - "vmSize": "Standard_D2_v2", - "customNodeLabels" : { - "foo" : "bar", - "attribute1" : "value1" - } - }, - { - "name": "agentpublic", - "count": 3, - "vmSize": "Standard_D2_v2", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} diff --git a/examples/dcos-attributes/images/dcosattributes.png b/examples/dcos-attributes/images/dcosattributes.png deleted file mode 100644 index efedd16f0..000000000 Binary files a/examples/dcos-attributes/images/dcosattributes.png and /dev/null differ diff --git a/examples/dcos-private-registry/README.md b/examples/dcos-private-registry/README.md deleted file mode 100644 index 5c5921d38..000000000 --- a/examples/dcos-private-registry/README.md +++ /dev/null @@ -1,67 +0,0 @@ -# Private Registry Support - -ACS can deploy credentials to private registries to agent nodes DC/OS clusters. - -The credentials are specified in the orchestrator profile in the apimodel: -``` - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS", - "dcosConfig" : { - "Registry" : "", - "RegistryUser" : "", - "RegistryPassword" : "" - } - }, -``` - -The agent provisioning process will then create a tar archive containing a docker config as documented at: [Using a Private Docker Registry](https://docs.mesosphere.com/1.9/deploying-services/private-docker-registry/) - -## Example -Let's provision a DC/OS cluster with credentials to an [Azure Container Registry](https://azure.microsoft.com/en-us/services/container-registry/) deployed to every agent node. - -- First, [provision an Azure Container Registry](https://docs.microsoft.com/en-us/azure/container-registry/container-registry-managed-get-started-portal). - -- Enable Admin Access and note the registry credentials -ACR Blade with Admin Access enabled - -- Clone [aks-engine](http://github.com/azure/aks-engine) and [start the container with the dev environment](https://github.com/Azure/aks-engine/blob/master/docs/acsengine.md). - -- Edit the API model to include the credentials -``` - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS", - "registry" : "xtophregistry.azurecr.io", - "registryUser" : "xtophregistry", - "registryPassword" : "aN//=+l==Z+/A=3hXhA+mSX=rXwB/UgW" - }, -``` - -- Run aks-engine to create ARM templates -``` -./aks-engine generate examples/dcos-private-registry/dcos.json -``` - -- Deploy the cluster -``` -az group create -l eastus -n cluster-rg -az group deployment create -g cluster-rg --template-file _output/dcoscluster/azuredeploy.json --parameters @_output/dcoscluster/azuredeploy.parameters.json -``` - -- Create a Service to deploy a container from the ACR -Service Creation from Registry - -- Add the credential path on the agent using the JSON editor -JSON editor with credential path - -- See the Service running -Running Service - -- Check the credential deployment -Running Service - -## Limitations -- The API model currenlty only supports credentials to a single registry. -- Not tested with Kubernetes clusters -- Credentials have to be updated on each node diff --git a/examples/dcos-private-registry/dcos.json b/examples/dcos-private-registry/dcos.json deleted file mode 100644 index c58e5503c..000000000 --- a/examples/dcos-private-registry/dcos.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS", - "dcosConfig" : { - "registry" : "", - "registryUser" : "", - "registryPassword" : "" - } - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "agentprivate", - "count": 1, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpublic", - "count": 1, - "vmSize": "Standard_D2_v2", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} diff --git a/examples/dcos-releases/README.md b/examples/dcos-releases/README.md deleted file mode 100644 index 0d8a93ee5..000000000 --- a/examples/dcos-releases/README.md +++ /dev/null @@ -1,13 +0,0 @@ -# Microsoft Azure Container Service Engine - DC/OS Versions - -## Overview - -This section provides example templates enable creation of Docker enabled cluster with older version of the DC/OS orchestrator. - -Here are the release channels aks-engine is able to deploy: - -1. DC/OS `1.8`. Access by specifying `"orchestratorVersion": "1.8.8"`. -2. DC/OS `1.9`. Access by specifying `"orchestratorVersion": "1.9.0"`. -3. DC/OS `1.10`. Access by specifying `"orchestratorVersion": "1.10.0"`. - -Deploying and using [DC/OS](../../docs/dcos.md) diff --git a/examples/dcos-releases/dcos1.10.json b/examples/dcos-releases/dcos1.10.json deleted file mode 100644 index ade44c559..000000000 --- a/examples/dcos-releases/dcos1.10.json +++ /dev/null @@ -1,42 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS", - "orchestratorRelease": "1.10" - }, - "masterProfile": { - "count": 3, - "dnsPrefix": "", - "vmSize": "Standard_D2s_v3" - }, - "agentPoolProfiles": [ - { - "name": "agentprivate", - "count": 2, - "vmSize": "Standard_D2s_v3" - }, - { - "name": "agentpublic", - "count": 2, - "vmSize": "Standard_D2s_v3", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} diff --git a/examples/dcos-releases/dcos1.8.json b/examples/dcos-releases/dcos1.8.json deleted file mode 100644 index 0d42ff171..000000000 --- a/examples/dcos-releases/dcos1.8.json +++ /dev/null @@ -1,42 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS", - "orchestratorRelease": "1.8" - }, - "masterProfile": { - "count": 3, - "dnsPrefix": "", - "vmSize": "Standard_D2s_v3" - }, - "agentPoolProfiles": [ - { - "name": "agentprivate", - "count": 3, - "vmSize": "Standard_D2s_v3" - }, - { - "name": "agentpublic", - "count": 3, - "vmSize": "Standard_D2s_v3", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} diff --git a/examples/dcos-releases/dcos1.9.json b/examples/dcos-releases/dcos1.9.json deleted file mode 100644 index 3936799ce..000000000 --- a/examples/dcos-releases/dcos1.9.json +++ /dev/null @@ -1,42 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS", - "orchestratorRelease": "1.9" - }, - "masterProfile": { - "count": 3, - "dnsPrefix": "", - "vmSize": "Standard_D2s_v3" - }, - "agentPoolProfiles": [ - { - "name": "agentprivate", - "count": 3, - "vmSize": "Standard_D2s_v3" - }, - { - "name": "agentpublic", - "count": 3, - "vmSize": "Standard_D2s_v3", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} diff --git a/examples/dcos.json b/examples/dcos.json deleted file mode 100644 index 125dccbf5..000000000 --- a/examples/dcos.json +++ /dev/null @@ -1,41 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2s_v3" - }, - "agentPoolProfiles": [ - { - "name": "agentprivate", - "count": 2, - "vmSize": "Standard_D2s_v3" - }, - { - "name": "agentpublic", - "count": 2, - "vmSize": "Standard_D2s_v3", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} diff --git a/examples/disks-managed/README.md b/examples/disks-managed/README.md index be027bbec..6d837e0fc 100644 --- a/examples/disks-managed/README.md +++ b/examples/disks-managed/README.md @@ -1,7 +1,7 @@ -# Microsoft Azure Container Service Engine - Managed Disks +# Microsoft Azure Kubernetes Engine - Managed Disks ## Overview -AKS Engine enables you to create customized Docker enabled cluster on Microsoft Azure with [managed disks](https://docs.microsoft.com/en-us/azure/storage/storage-managed-disks-overview). +AKS Engine enables you to create customized Kubernetes cluster on Microsoft Azure with [managed disks](https://docs.microsoft.com/en-us/azure/storage/storage-managed-disks-overview). These examples are provided as a reference, note that managed disks is the default storage account type if none is specified. diff --git a/examples/disks-managed/dcos-preAttachedDisks-vmas.json b/examples/disks-managed/dcos-preAttachedDisks-vmas.json deleted file mode 100644 index e544e61eb..000000000 --- a/examples/disks-managed/dcos-preAttachedDisks-vmas.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2s_v3" - }, - "agentPoolProfiles": [ - { - "name": "agentpublic", - "count": 6, - "vmSize": "Standard_D2s_v3", - "availabilityProfile": "AvailabilitySet", - "storageProfile": "ManagedDisks", - "diskSizesGB": [128, 128, 128, 128], - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} \ No newline at end of file diff --git a/examples/disks-managed/dcos-preAttachedDisks-vmas.json.env b/examples/disks-managed/dcos-preAttachedDisks-vmas.json.env deleted file mode 100644 index 7404e4a54..000000000 --- a/examples/disks-managed/dcos-preAttachedDisks-vmas.json.env +++ /dev/null @@ -1 +0,0 @@ -MARATHON_JSON=marathon-slave-public.json diff --git a/examples/disks-managed/dcos-preAttachedDisks-vmss.json b/examples/disks-managed/dcos-preAttachedDisks-vmss.json deleted file mode 100644 index 5b8b22dc3..000000000 --- a/examples/disks-managed/dcos-preAttachedDisks-vmss.json +++ /dev/null @@ -1,33 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "agent128", - "count": 3, - "vmSize": "Standard_D2_v2", - "AvailabilityProfile": "VirtualMachineScaleSets", - "storageProfile": "ManagedDisks", - "diskSizesGB": [128, 128, 128, 128] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} \ No newline at end of file diff --git a/examples/disks-managed/dcos-vmas.json b/examples/disks-managed/dcos-vmas.json deleted file mode 100644 index 12fccad1a..000000000 --- a/examples/disks-managed/dcos-vmas.json +++ /dev/null @@ -1,34 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2", - "OSDiskSizeGB": 200 - }, - "agentPoolProfiles": [ - { - "name": "agent128", - "count": 3, - "vmSize": "Standard_D2_v2", - "OSDiskSizeGB": 200, - "availabilityProfile": "AvailabilitySet", - "storageProfile": "ManagedDisks" - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} \ No newline at end of file diff --git a/examples/disks-managed/dcos-vmss.json b/examples/disks-managed/dcos-vmss.json deleted file mode 100644 index 440e4b084..000000000 --- a/examples/disks-managed/dcos-vmss.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2s_v3", - "OSDiskSizeGB": 200 - }, - "agentPoolProfiles": [ - { - "name": "agentpublic", - "count": 3, - "vmSize": "Standard_D2s_v3", - "OSDiskSizeGB": 200, - "AvailabilityProfile": "VirtualMachineScaleSets", - "storageProfile": "ManagedDisks", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} \ No newline at end of file diff --git a/examples/disks-managed/dcos-vmss.json.env b/examples/disks-managed/dcos-vmss.json.env deleted file mode 100644 index 7404e4a54..000000000 --- a/examples/disks-managed/dcos-vmss.json.env +++ /dev/null @@ -1 +0,0 @@ -MARATHON_JSON=marathon-slave-public.json diff --git a/examples/disks-managed/swarm-preAttachedDisks-vmas.json b/examples/disks-managed/swarm-preAttachedDisks-vmas.json deleted file mode 100644 index 0fe76bd11..000000000 --- a/examples/disks-managed/swarm-preAttachedDisks-vmas.json +++ /dev/null @@ -1,47 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "Swarm" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "agentpool1", - "count": 3, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet", - "storageProfile": "ManagedDisks", - "diskSizesGB": [128, 128, 128, 128] - }, - { - "name": "agentpublic", - "count": 3, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet", - "storageProfile": "ManagedDisks", - "diskSizesGB": [128, 128, 128, 128], - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} \ No newline at end of file diff --git a/examples/disks-managed/swarm-preAttachedDisks-vmss.json b/examples/disks-managed/swarm-preAttachedDisks-vmss.json deleted file mode 100644 index 5563335ff..000000000 --- a/examples/disks-managed/swarm-preAttachedDisks-vmss.json +++ /dev/null @@ -1,47 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "Swarm" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "agentpool1", - "count": 1, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "VirtualMachineScaleSets", - "storageProfile": "ManagedDisks", - "diskSizesGB": [128, 128, 128, 128] - }, - { - "name": "agentpublic", - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2", - "availabilityProfile": "VirtualMachineScaleSets", - "storageProfile": "ManagedDisks", - "diskSizesGB": [128, 128, 128, 128], - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} \ No newline at end of file diff --git a/examples/disks-managed/swarm-vmas.json b/examples/disks-managed/swarm-vmas.json deleted file mode 100644 index c20f44e59..000000000 --- a/examples/disks-managed/swarm-vmas.json +++ /dev/null @@ -1,47 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "Swarm" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "agentpool1", - "count": 3, - "vmSize": "Standard_D2_v2", - "OSDiskSizeGB": 200, - "availabilityProfile": "AvailabilitySet", - "storageProfile": "ManagedDisks" - }, - { - "name": "agentpublic", - "count": 3, - "vmSize": "Standard_D2_v2", - "OSDiskSizeGB": 200, - "availabilityProfile": "AvailabilitySet", - "storageProfile": "ManagedDisks", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} \ No newline at end of file diff --git a/examples/disks-managed/swarm-vmss.json b/examples/disks-managed/swarm-vmss.json deleted file mode 100644 index b9cd60e94..000000000 --- a/examples/disks-managed/swarm-vmss.json +++ /dev/null @@ -1,45 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "Swarm" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "agentpool1", - "count": 3, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "VirtualMachineScaleSets", - "storageProfile": "ManagedDisks" - }, - { - "name": "agentpublic", - "count": 3, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "VirtualMachineScaleSets", - "storageProfile": "ManagedDisks", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} \ No newline at end of file diff --git a/examples/disks-managed/swarmmode-vmas.json b/examples/disks-managed/swarmmode-vmas.json deleted file mode 100644 index 085db0785..000000000 --- a/examples/disks-managed/swarmmode-vmas.json +++ /dev/null @@ -1,47 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "SwarmMode" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "agentpool1", - "count": 1, - "vmSize": "Standard_D2_v2", - "OSDiskSizeGB": 200, - "availabilityProfile": "AvailabilitySet", - "storageProfile": "ManagedDisks" - }, - { - "name": "agentpublic", - "count": 1, - "vmSize": "Standard_D2_v2", - "OSDiskSizeGB": 200, - "availabilityProfile": "AvailabilitySet", - "storageProfile": "ManagedDisks", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} \ No newline at end of file diff --git a/examples/disks-managed/swarmmode-vmss.json b/examples/disks-managed/swarmmode-vmss.json deleted file mode 100644 index ea4b22306..000000000 --- a/examples/disks-managed/swarmmode-vmss.json +++ /dev/null @@ -1,45 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "SwarmMode" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "agentpool1", - "count": 1, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "VirtualMachineScaleSets", - "storageProfile": "ManagedDisks" - }, - { - "name": "agentpublic", - "count": 1, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "VirtualMachineScaleSets", - "storageProfile": "ManagedDisks", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} \ No newline at end of file diff --git a/examples/disks-storageaccount/README.md b/examples/disks-storageaccount/README.md index f86a2d0e9..7ee8f3ab6 100644 --- a/examples/disks-storageaccount/README.md +++ b/examples/disks-storageaccount/README.md @@ -1,8 +1,8 @@ -# Microsoft Azure Container Service Engine - Attached Disks +# Microsoft Azure Kubernetes Engine - Attached Disks ## Overview -AKS Engine enables you to create customized Docker enabled cluster on Microsoft Azure with attached disks. +AKS Engine enables you to create customized Kubernetes cluster on Microsoft Azure with attached disks. The examples show you how to configure up to 4 attached disks. The disks can range from 1 to 1024 GB in size: diff --git a/examples/disks-storageaccount/dcos-master-sa.json b/examples/disks-storageaccount/dcos-master-sa.json deleted file mode 100644 index 36c652645..000000000 --- a/examples/disks-storageaccount/dcos-master-sa.json +++ /dev/null @@ -1,42 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2", - "storageProfile": "StorageAccount" - }, - "agentPoolProfiles": [ - { - "name": "agentprivate", - "count": 1, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpublic", - "count": 1, - "vmSize": "Standard_D2_v2", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} diff --git a/examples/disks-storageaccount/dcos.json b/examples/disks-storageaccount/dcos.json deleted file mode 100644 index 5fb442d0a..000000000 --- a/examples/disks-storageaccount/dcos.json +++ /dev/null @@ -1,49 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS" - }, - "masterProfile": { - "count": 3, - "dnsPrefix": "", - "vmSize": "Standard_D2s_v3", - "OSDiskSizeGB": 200 - }, - "agentPoolProfiles": [ - { - "name": "agent128", - "count": 3, - "vmSize": "Standard_D2s_v3", - "OSDiskSizeGB": 200, - "availabilityProfile": "AvailabilitySet", - "storageProfile": "StorageAccount", - "diskSizesGB": [128, 128, 128, 128] - }, - { - "name": "agentpublic", - "count": 3, - "vmSize": "Standard_D2s_v3", - "dnsPrefix": "", - "availabilityProfile": "AvailabilitySet", - "storageProfile": "StorageAccount", - "diskSizesGB": [1], - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} \ No newline at end of file diff --git a/examples/disks-storageaccount/swarm.json b/examples/disks-storageaccount/swarm.json deleted file mode 100644 index e052b57df..000000000 --- a/examples/disks-storageaccount/swarm.json +++ /dev/null @@ -1,49 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "Swarm" - }, - "masterProfile": { - "count": 3, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2", - "OSDiskSizeGB": 200 - }, - "agentPoolProfiles": [ - { - "name": "agent128", - "count": 3, - "vmSize": "Standard_D2_v2", - "OSDiskSizeGB": 200, - "availabilityProfile": "AvailabilitySet", - "storageProfile": "StorageAccount", - "diskSizesGB": [128, 128, 128, 128] - }, - { - "name": "agentpublic", - "count": 3, - "vmSize": "Standard_D2_v2", - "dnsPrefix": "", - "availabilityProfile": "AvailabilitySet", - "storageProfile": "StorageAccount", - "diskSizesGB": [1], - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} \ No newline at end of file diff --git a/examples/disks-storageaccount/swarmmode-master-sa.json b/examples/disks-storageaccount/swarmmode-master-sa.json deleted file mode 100644 index 460df95b7..000000000 --- a/examples/disks-storageaccount/swarmmode-master-sa.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "SwarmMode" - }, - "masterProfile": { - "count": 3, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2", - "storageProfile": "StorageAccount" - }, - "agentPoolProfiles": [ - { - "name": "agentpublic", - "count": 3, - "vmSize": "Standard_D2_v2", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} diff --git a/examples/disks-storageaccount/swarmmode.json b/examples/disks-storageaccount/swarmmode.json deleted file mode 100644 index 3992adf8f..000000000 --- a/examples/disks-storageaccount/swarmmode.json +++ /dev/null @@ -1,49 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "SwarmMode" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2", - "OSDiskSizeGB": 200 - }, - "agentPoolProfiles": [ - { - "name": "agent128", - "count": 1, - "vmSize": "Standard_D2_v2", - "OSDiskSizeGB": 200, - "availabilityProfile": "AvailabilitySet", - "storageProfile": "StorageAccount", - "diskSizesGB": [128, 128, 128, 128] - }, - { - "name": "agentpublic", - "count": 1, - "vmSize": "Standard_D2_v2", - "dnsPrefix": "", - "availabilityProfile": "AvailabilitySet", - "storageProfile": "StorageAccount", - "diskSizesGB": [1], - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} \ No newline at end of file diff --git a/examples/extensions/dcos.json b/examples/extensions/dcos.json deleted file mode 100644 index a7672f64a..000000000 --- a/examples/extensions/dcos.json +++ /dev/null @@ -1,53 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2", - "extensions": [ - { - "name": "hello-world-dcos", - "singleOrAll": "single" - } - ] - }, - "agentPoolProfiles": [ - { - "name": "agentprivate", - "count": 3, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpublic", - "count": 1, - "vmSize": "Standard_D2_v2", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - }, - "extensionProfiles": [ - { - "name": "hello-world-dcos", - "version": "v1" - } - ] - } -} diff --git a/examples/extensions/dcos.preprovision.json b/examples/extensions/dcos.preprovision.json deleted file mode 100644 index fb2462c6c..000000000 --- a/examples/extensions/dcos.preprovision.json +++ /dev/null @@ -1,56 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2", - "preProvisionExtension": { - "name": "hello-world", - "singleOrAll": "All" - } - }, - "agentPoolProfiles": [ - { - "name": "agentprivate", - "count": 3, - "vmSize": "Standard_D2_v2", - "preProvisionExtension": { - "name": "hello-world", - "singleOrAll": "All" - } - }, - { - "name": "agentpublic", - "count": 1, - "vmSize": "Standard_D2_v2", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - }, - "extensionProfiles": [ - { - "name": "hello-world", - "version": "v1", - "script": "hello.sh" - } - ] - } -} diff --git a/examples/extensions/swarmmode.preprovision.json b/examples/extensions/swarmmode.preprovision.json deleted file mode 100644 index aac74b125..000000000 --- a/examples/extensions/swarmmode.preprovision.json +++ /dev/null @@ -1,51 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "SwarmMode" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2", - "preProvisionExtension": { - "name": "hello-world", - "singleOrAll": "All" - } - }, - "agentPoolProfiles": [ - { - "name": "agentpublic", - "count": 1, - "vmSize": "Standard_D2_v2", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ], - "preProvisionExtension": { - "name": "hello-world", - "singleOrAll": "All" - } - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - }, - "extensionProfiles": [ - { - "name": "hello-world", - "version": "v1", - "script": "hello.sh" - } - ] - } -} diff --git a/examples/k8s-upgrade/README.md b/examples/k8s-upgrade/README.md index 511cc6fa7..f1da75799 100644 --- a/examples/k8s-upgrade/README.md +++ b/examples/k8s-upgrade/README.md @@ -1,4 +1,4 @@ -# Microsoft Azure Container Service Engine - Kubernetes Upgrade +# Microsoft Azure Kubernetes Engine - Kubernetes Upgrade ## Overview diff --git a/examples/keyvault-params/README.md b/examples/keyvault-params/README.md index 80f867123..4dbc12212 100644 --- a/examples/keyvault-params/README.md +++ b/examples/keyvault-params/README.md @@ -1,4 +1,4 @@ -# Microsoft Azure Container Service Engine - Key vault referencing for k8s parameters +# Microsoft Azure Kubernetes Engine - Key vault referencing for k8s parameters ## Overview diff --git a/examples/keyvaultcerts/README.md b/examples/keyvaultcerts/README.md index dc879fce7..40cb69258 100644 --- a/examples/keyvaultcerts/README.md +++ b/examples/keyvaultcerts/README.md @@ -1,8 +1,8 @@ -# Microsoft Azure Container Service Engine - Key vault certificate deployment +# Microsoft Azure Kubernetes Engine - Key vault certificate deployment ## Overview -AKS Engine enables you to create customized Docker enabled cluster on Microsoft Azure with certs installed from key vault during deployment. +AKS Engine enables you to create customized Kubernetes cluster on Microsoft Azure with certs installed from key vault during deployment. The examples show you how to configure installing a cert from keyvault. These certs are assumed to be in the secrets portion of your keyvault: diff --git a/examples/keyvaultcerts/dcos.json b/examples/keyvaultcerts/dcos.json deleted file mode 100644 index 0f9d21c9a..000000000 --- a/examples/keyvaultcerts/dcos.json +++ /dev/null @@ -1,53 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS" - }, - "masterProfile": { - "count": 3, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "agentprivate", - "count": 3, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpublic", - "count": 3, - "vmSize": "Standard_D2_v2", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - }, - "secrets":[ - { - "sourceVault":{ - "id":"" - }, - "vaultCertificates":[ - { - "certificateUrl" :"" - } - ] - } - ] - } - } -} diff --git a/examples/keyvaultcerts/swarm.json b/examples/keyvaultcerts/swarm.json deleted file mode 100644 index 94c2f6f72..000000000 --- a/examples/keyvaultcerts/swarm.json +++ /dev/null @@ -1,48 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "Swarm" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "agentpublic", - "count": 3, - "vmSize": "Standard_D2_v2", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - }, - "secrets":[ - { - "sourceVault":{ - "id":"" - }, - "vaultCertificates":[ - { - "certificateUrl" :"" - } - ] - } - ] - } - } -} diff --git a/examples/keyvaultcerts/swarmmode.json b/examples/keyvaultcerts/swarmmode.json deleted file mode 100644 index fbca8ab59..000000000 --- a/examples/keyvaultcerts/swarmmode.json +++ /dev/null @@ -1,59 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "SwarmMode" - }, - "masterProfile": { - "count": 3, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "agent128", - "count": 3, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet", - "storageProfile": "StorageAccount", - "diskSizesGB": [128, 128, 128, 128] - }, - { - "name": "agentpublic", - "count": 3, - "vmSize": "Standard_D2_v2", - "dnsPrefix": "", - "availabilityProfile": "AvailabilitySet", - "storageProfile": "StorageAccount", - "diskSizesGB": [1], - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - }, - "secrets":[ - { - "sourceVault":{ - "id":"" - }, - "vaultCertificates":[ - { - "certificateUrl" :"" - } - ] - } - ] - } - } -} diff --git a/examples/kubernetes-config/README.md b/examples/kubernetes-config/README.md index e35097965..14bada813 100644 --- a/examples/kubernetes-config/README.md +++ b/examples/kubernetes-config/README.md @@ -1,4 +1,4 @@ -# Microsoft Azure Container Service Engine - Kubernetes Features +# Microsoft Azure Kubernetes Engine - Kubernetes Features ## Overview diff --git a/examples/largeclusters/README.md b/examples/largeclusters/README.md index b24a119d5..9cc950653 100644 --- a/examples/largeclusters/README.md +++ b/examples/largeclusters/README.md @@ -1,8 +1,8 @@ -# Microsoft Azure Container Service Engine - Large Clusters +# Microsoft Azure Kubernetes Engine - Large Clusters ## Overview -AKS Engine enables you to create customized Docker enabled cluster on Microsoft Azure with 1200 nodes. +AKS Engine enables you to create customized Kubernetes cluster on Microsoft Azure with 1200 nodes. The examples show you how to configure up to 12 agent pools with 100 nodes each: diff --git a/examples/largeclusters/dcos-vmas.json b/examples/largeclusters/dcos-vmas.json deleted file mode 100644 index 4701c909e..000000000 --- a/examples/largeclusters/dcos-vmas.json +++ /dev/null @@ -1,97 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS" - }, - "masterProfile": { - "count": 3, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "agentpool0", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool1", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool2", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool3", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool4", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool5", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool6", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool7", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool8", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool9", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool10", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool11", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} \ No newline at end of file diff --git a/examples/largeclusters/dcos.json b/examples/largeclusters/dcos.json deleted file mode 100644 index fafff2899..000000000 --- a/examples/largeclusters/dcos.json +++ /dev/null @@ -1,85 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS" - }, - "masterProfile": { - "count": 3, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "agentpool0", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool1", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool2", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool3", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool4", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool5", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool6", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool7", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool8", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool9", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool10", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool11", - "count": 100, - "vmSize": "Standard_D2_v2" - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} \ No newline at end of file diff --git a/examples/largeclusters/swarm-vmas.json b/examples/largeclusters/swarm-vmas.json deleted file mode 100644 index a4f2b28b9..000000000 --- a/examples/largeclusters/swarm-vmas.json +++ /dev/null @@ -1,97 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "Swarm" - }, - "masterProfile": { - "count": 3, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "agentpool0", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool1", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool2", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool3", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool4", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool5", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool6", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool7", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool8", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool9", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool10", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool11", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} \ No newline at end of file diff --git a/examples/largeclusters/swarm.json b/examples/largeclusters/swarm.json deleted file mode 100644 index 22c48ac83..000000000 --- a/examples/largeclusters/swarm.json +++ /dev/null @@ -1,85 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "Swarm" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "agentpool0", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool1", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool2", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool3", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool4", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool5", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool6", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool7", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool8", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool9", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool10", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool11", - "count": 100, - "vmSize": "Standard_D2_v2" - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} \ No newline at end of file diff --git a/examples/largeclusters/swarmmode-vmas.json b/examples/largeclusters/swarmmode-vmas.json deleted file mode 100644 index 9dbd37c18..000000000 --- a/examples/largeclusters/swarmmode-vmas.json +++ /dev/null @@ -1,97 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "SwarmMode" - }, - "masterProfile": { - "count": 3, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "agentpool0", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool1", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool2", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool3", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool4", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool5", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool6", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool7", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool8", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool9", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool10", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - }, - { - "name": "agentpool11", - "count": 100, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet" - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} \ No newline at end of file diff --git a/examples/largeclusters/swarmmode.json b/examples/largeclusters/swarmmode.json deleted file mode 100644 index 72f6a515c..000000000 --- a/examples/largeclusters/swarmmode.json +++ /dev/null @@ -1,85 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "SwarmMode" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "agentpool0", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool1", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool2", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool3", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool4", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool5", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool6", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool7", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool8", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool9", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool10", - "count": 100, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpool11", - "count": 100, - "vmSize": "Standard_D2_v2" - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} \ No newline at end of file diff --git a/examples/networkplugin/README.md b/examples/networkplugin/README.md index 3afcaff87..fa267c69d 100644 --- a/examples/networkplugin/README.md +++ b/examples/networkplugin/README.md @@ -1,10 +1,10 @@ -# Microsoft Azure Container Service Engine - Network Plugin +# Microsoft Azure Kubernetes Engine - Network Plugin There are 2 different Network Plugin options : - Azure Container Networking (default) - Kubenet -- Flannel (docs are //TODO) +- Flannel (docs are //TODO) - Cilium (docs are //TODO) ## Azure Container Networking (default) diff --git a/examples/networkpolicy/README.md b/examples/networkpolicy/README.md index 50964ebf6..a70da0843 100644 --- a/examples/networkpolicy/README.md +++ b/examples/networkpolicy/README.md @@ -1,4 +1,4 @@ -# Microsoft Azure Container Service Engine - Network Policy +# Microsoft Azure Kubernetes Engine - Network Policy There are 2 different Network Policy options : diff --git a/examples/swarm.json b/examples/swarm.json deleted file mode 100644 index 797884c9a..000000000 --- a/examples/swarm.json +++ /dev/null @@ -1,36 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "Swarm" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "agentpublic", - "count": 1, - "vmSize": "Standard_D2_v2", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} diff --git a/examples/swarmmode-D2.json b/examples/swarmmode-D2.json deleted file mode 100644 index 0a73cf144..000000000 --- a/examples/swarmmode-D2.json +++ /dev/null @@ -1,36 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "SwarmMode" - }, - "masterProfile": { - "count": 3, - "dnsPrefix": "", - "vmSize": "Standard_D2" - }, - "agentPoolProfiles": [ - { - "name": "agentpublic", - "count": 3, - "vmSize": "Standard_D2", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} diff --git a/examples/swarmmode-rhel.json b/examples/swarmmode-rhel.json deleted file mode 100644 index 946674470..000000000 --- a/examples/swarmmode-rhel.json +++ /dev/null @@ -1,38 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "SwarmMode" - }, - "masterProfile": { - "count": 3, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2", - "distro": "rhel" - }, - "agentPoolProfiles": [ - { - "name": "agentpublic", - "count": 3, - "vmSize": "Standard_D2_v2", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ], - "distro": "rhel" - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} diff --git a/examples/swarmmode.json b/examples/swarmmode.json deleted file mode 100644 index e4781fec8..000000000 --- a/examples/swarmmode.json +++ /dev/null @@ -1,36 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "SwarmMode" - }, - "masterProfile": { - "count": 3, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "agentpublic", - "count": 3, - "vmSize": "Standard_D2_v2", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} diff --git a/examples/v20160330/dcos.json b/examples/v20160330/dcos.json deleted file mode 100644 index f1d41b904..000000000 --- a/examples/v20160330/dcos.json +++ /dev/null @@ -1,35 +0,0 @@ -{ - "apiVersion": "2016-09-30", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS" - }, - "masterProfile": { - "count": 3, - "dnsPrefix": "" - }, - "agentPoolProfiles": [ - { - "name": "agentprivate", - "count": 3, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpublic", - "count": 3, - "vmSize": "Standard_D2_v2", - "dnsPrefix": "" - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} \ No newline at end of file diff --git a/examples/v20160330/swarm.json b/examples/v20160330/swarm.json deleted file mode 100644 index 0f9c4fe2f..000000000 --- a/examples/v20160330/swarm.json +++ /dev/null @@ -1,35 +0,0 @@ -{ - "apiVersion": "2016-03-30", - "properties": { - "orchestratorProfile": { - "orchestratorType": "Swarm" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "" - }, - "agentPoolProfiles": [ - { - "name": "agentpool1", - "count": 3, - "vmSize": "Standard_D2_v2", - "dnsPrefix": "" - }, - { - "name": "agentpool2", - "count": 3, - "vmSize": "Standard_D2_v2" - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} \ No newline at end of file diff --git a/examples/v20160930/dcos.json b/examples/v20160930/dcos.json deleted file mode 100644 index f1d41b904..000000000 --- a/examples/v20160930/dcos.json +++ /dev/null @@ -1,35 +0,0 @@ -{ - "apiVersion": "2016-09-30", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS" - }, - "masterProfile": { - "count": 3, - "dnsPrefix": "" - }, - "agentPoolProfiles": [ - { - "name": "agentprivate", - "count": 3, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpublic", - "count": 3, - "vmSize": "Standard_D2_v2", - "dnsPrefix": "" - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} \ No newline at end of file diff --git a/examples/v20170131/dcos.json b/examples/v20170131/dcos.json deleted file mode 100644 index 8abfed963..000000000 --- a/examples/v20170131/dcos.json +++ /dev/null @@ -1,35 +0,0 @@ -{ - "apiVersion": "2017-01-31", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS" - }, - "masterProfile": { - "count": 3, - "dnsPrefix": "" - }, - "agentPoolProfiles": [ - { - "name": "agentprivate", - "count": 3, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpublic", - "count": 3, - "vmSize": "Standard_D2_v2", - "dnsPrefix": "" - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} \ No newline at end of file diff --git a/examples/v20170131/swarmmode.json b/examples/v20170131/swarmmode.json deleted file mode 100644 index 3a5387af2..000000000 --- a/examples/v20170131/swarmmode.json +++ /dev/null @@ -1,36 +0,0 @@ -{ - "apiVersion": "2017-01-31", - "properties": { - "orchestratorProfile": { - "orchestratorType": "SwarmMode" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "agentpublic", - "count": 1, - "vmSize": "Standard_D2_v2", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} diff --git a/examples/v20170701/dcos.json b/examples/v20170701/dcos.json deleted file mode 100644 index 70634bf38..000000000 --- a/examples/v20170701/dcos.json +++ /dev/null @@ -1,41 +0,0 @@ -{ - "apiVersion": "2017-07-01", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "agentprivate", - "count": 1, - "vmSize": "Standard_D2_v2" - }, - { - "name": "agentpublic", - "count": 1, - "vmSize": "Standard_D2_v2", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} diff --git a/examples/v20170701/dockerce.json b/examples/v20170701/dockerce.json deleted file mode 100644 index 72b1b411e..000000000 --- a/examples/v20170701/dockerce.json +++ /dev/null @@ -1,36 +0,0 @@ -{ - "apiVersion": "2017-07-01", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DockerCE" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "agentpublic", - "count": 3, - "vmSize": "Standard_D2_v2", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} diff --git a/examples/vnet/README.md b/examples/vnet/README.md index a4209d528..b9ead0e21 100644 --- a/examples/vnet/README.md +++ b/examples/vnet/README.md @@ -1,10 +1,10 @@ -# Microsoft Azure Container Service Engine - Custom VNET +# Microsoft Azure Kubernetes Engine - Custom VNET ## Overview -These examples show you how to build a customized Docker enabled cluster on Microsoft Azure where you can provide your own VNET. +These examples show you how to build a customized Kubernetes cluster on Microsoft Azure where you can provide your own VNET. -To try: +To try: 1. first deploy a custom vnet. An example of an arm template that does this is under directory vnetarmtemplate. 2. next configure the example templates and deploy according to the examples: @@ -12,4 +12,3 @@ To try: 2. **dcos.json** - deploying and using [DC/OS](../../docs/dcos.md) 3. **swarm.json** - deploying and using [Swarm](../../docs/swarm.md) 4. **swarmmodevnet.json** - deploying and using [Swarm Mode](../../docs/swarmmode.md) - diff --git a/examples/vnet/dcosvnet.json b/examples/vnet/dcosvnet.json deleted file mode 100644 index 2669450c3..000000000 --- a/examples/vnet/dcosvnet.json +++ /dev/null @@ -1,46 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS" - }, - "masterProfile": { - "count": 3, - "dnsPrefix": "", - "vmSize": "Standard_D2s_v3", - "vnetSubnetId": "/subscriptions/SUB_ID/resourceGroups/RG_NAME/providers/Microsoft.Network/virtualNetworks/VNET_NAME/subnets/MASTER_SUBNET_NAME", - "firstConsecutiveStaticIP": "10.100.0.5" - }, - "agentPoolProfiles": [ - { - "name": "agentprivate", - "count": 3, - "vmSize": "Standard_D2s_v3", - "availabilityProfile": "AvailabilitySet", - "vnetSubnetId": "/subscriptions/SUB_ID/resourceGroups/RG_NAME/providers/Microsoft.Network/virtualNetworks/VNET_NAME/subnets/AGENT_SUBNET_NAME" - }, - { - "name": "agentpublic", - "count": 3, - "vmSize": "Standard_D2s_v3", - "dnsPrefix": "", - "vnetSubnetId": "/subscriptions/SUB_ID/resourceGroups/RG_NAME/providers/Microsoft.Network/virtualNetworks/VNET_NAME/subnets/AGENT_SUBNET_NAME", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } -} -} \ No newline at end of file diff --git a/examples/vnet/dcosvnet.json.env b/examples/vnet/dcosvnet.json.env deleted file mode 100644 index 99d34edcc..000000000 --- a/examples/vnet/dcosvnet.json.env +++ /dev/null @@ -1 +0,0 @@ -AKSE_PREDEPLOY=examples/vnet/dual-subnet-vnet-predeploy.sh diff --git a/examples/vnet/swarmmodevnet.json b/examples/vnet/swarmmodevnet.json deleted file mode 100644 index da253f0fd..000000000 --- a/examples/vnet/swarmmodevnet.json +++ /dev/null @@ -1,45 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "SwarmMode" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2", - "vnetSubnetId": "/subscriptions/SUB_ID/resourceGroups/RG_NAME/providers/Microsoft.Network/virtualNetworks/VNET_NAME/subnets/MASTER_SUBNET_NAME", - "firstConsecutiveStaticIP": "10.100.0.5" - }, - "agentPoolProfiles": [ - { - "name": "agentprivate", - "count": 1, - "vmSize": "Standard_D2_v2", - "vnetSubnetId": "/subscriptions/SUB_ID/resourceGroups/RG_NAME/providers/Microsoft.Network/virtualNetworks/VNET_NAME/subnets/AGENT_SUBNET_NAME" - }, - { - "name": "agentpublic", - "count": 1, - "vmSize": "Standard_D2_v2", - "dnsPrefix": "", - "vnetSubnetId": "/subscriptions/SUB_ID/resourceGroups/RG_NAME/providers/Microsoft.Network/virtualNetworks/VNET_NAME/subnets/AGENT_SUBNET_NAME", - "ports": [ - 80, - 443, - 8080 - ] - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} \ No newline at end of file diff --git a/examples/vnet/swarmmodevnet.json.env b/examples/vnet/swarmmodevnet.json.env deleted file mode 100644 index 99d34edcc..000000000 --- a/examples/vnet/swarmmodevnet.json.env +++ /dev/null @@ -1 +0,0 @@ -AKSE_PREDEPLOY=examples/vnet/dual-subnet-vnet-predeploy.sh diff --git a/examples/vnet/vnetarmtemplate/azuredeploy.dcos.json b/examples/vnet/vnetarmtemplate/azuredeploy.dcos.json deleted file mode 100644 index ce845ba2f..000000000 --- a/examples/vnet/vnetarmtemplate/azuredeploy.dcos.json +++ /dev/null @@ -1,36 +0,0 @@ -{ - "$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#", - "contentVersion": "1.0.0.0", - "parameters": { }, - "variables": { }, - "resources": [ - { - "apiVersion": "2016-03-30", - "location": "[resourceGroup().location]", - "name": "ExampleCustomVNET", - "properties": { - "addressSpace": { - "addressPrefixes": [ - "10.100.0.0/24", - "10.200.0.0/24" - ] - }, - "subnets": [ - { - "name": "ExampleMasterSubnet", - "properties": { - "addressPrefix": "10.100.0.0/24" - } - }, - { - "name": "ExampleAgentSubnet", - "properties": { - "addressPrefix": "10.200.0.0/24" - } - } - ] - }, - "type": "Microsoft.Network/virtualNetworks" - } - ] -} diff --git a/examples/vnet/vnetarmtemplate/azuredeploy.swarm.json b/examples/vnet/vnetarmtemplate/azuredeploy.swarm.json deleted file mode 100644 index ce845ba2f..000000000 --- a/examples/vnet/vnetarmtemplate/azuredeploy.swarm.json +++ /dev/null @@ -1,36 +0,0 @@ -{ - "$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#", - "contentVersion": "1.0.0.0", - "parameters": { }, - "variables": { }, - "resources": [ - { - "apiVersion": "2016-03-30", - "location": "[resourceGroup().location]", - "name": "ExampleCustomVNET", - "properties": { - "addressSpace": { - "addressPrefixes": [ - "10.100.0.0/24", - "10.200.0.0/24" - ] - }, - "subnets": [ - { - "name": "ExampleMasterSubnet", - "properties": { - "addressPrefix": "10.100.0.0/24" - } - }, - { - "name": "ExampleAgentSubnet", - "properties": { - "addressPrefix": "10.200.0.0/24" - } - } - ] - }, - "type": "Microsoft.Network/virtualNetworks" - } - ] -} diff --git a/examples/windows/README.md b/examples/windows/README.md index 0bdf2c33a..e9ddb14f4 100644 --- a/examples/windows/README.md +++ b/examples/windows/README.md @@ -1,4 +1,4 @@ -# Microsoft Azure Container Service Engine +# Microsoft Azure Kubernetes Engine ## Overview diff --git a/examples/windows/dcos-win-version.json b/examples/windows/dcos-win-version.json deleted file mode 100644 index f4076e53c..000000000 --- a/examples/windows/dcos-win-version.json +++ /dev/null @@ -1,44 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "dcos-mstr", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "win2", - "count": 2, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet", - "osType": "Windows", - "dnsPrefix": "agnt", - "ports": [ - 80, - 443, - 8080, - 3389 - ] - } - ], - "windowsProfile": { - "adminUsername": "azureuser", - "adminPassword": "replacepassword1234$", - "imageVersion": "2016.127.20170411" - }, - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} diff --git a/examples/windows/dcos-win.json b/examples/windows/dcos-win.json deleted file mode 100644 index a3f10db5f..000000000 --- a/examples/windows/dcos-win.json +++ /dev/null @@ -1,43 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "dcos-mstr", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "win2", - "count": 2, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet", - "osType": "Windows", - "dnsPrefix": "agnt", - "ports": [ - 80, - 443, - 8080, - 3389 - ] - } - ], - "windowsProfile": { - "adminUsername": "azureuser", - "adminPassword": "replacepassword1234$" - }, - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} diff --git a/examples/windows/dcos-winagent.json b/examples/windows/dcos-winagent.json deleted file mode 100644 index a3f10db5f..000000000 --- a/examples/windows/dcos-winagent.json +++ /dev/null @@ -1,43 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "DCOS" - }, - "masterProfile": { - "count": 1, - "dnsPrefix": "dcos-mstr", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "win2", - "count": 2, - "vmSize": "Standard_D2_v2", - "availabilityProfile": "AvailabilitySet", - "osType": "Windows", - "dnsPrefix": "agnt", - "ports": [ - 80, - 443, - 8080, - 3389 - ] - } - ], - "windowsProfile": { - "adminUsername": "azureuser", - "adminPassword": "replacepassword1234$" - }, - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - } - } -} diff --git a/examples/windows/swarmmode-hybrid.json b/examples/windows/swarmmode-hybrid.json deleted file mode 100644 index 5147db984..000000000 --- a/examples/windows/swarmmode-hybrid.json +++ /dev/null @@ -1,47 +0,0 @@ -{ - "apiVersion": "vlabs", - "properties": { - "orchestratorProfile": { - "orchestratorType": "SwarmMode" - }, - "masterProfile": { - "count": 3, - "dnsPrefix": "", - "vmSize": "Standard_D2_v2" - }, - "agentPoolProfiles": [ - { - "name": "agentpublic", - "count": 3, - "vmSize": "Standard_D2_v2", - "dnsPrefix": "", - "ports": [ - 80, - 443, - 8080 - ] - }, - { - "name": "agentprivate", - "count": 3, - "vmSize": "Standard_D2_v2", - "dnsPrefix": "", - "osType": "Windows" - } - ], - "linuxProfile": { - "adminUsername": "azureuser", - "ssh": { - "publicKeys": [ - { - "keyData": "" - } - ] - } - }, - "windowsProfile": { - "adminUsername": "azureuser", - "adminPassword": "replacepassword1234$" - } - } -} \ No newline at end of file diff --git a/extensions/hello-world-dcos-windows/README.md b/extensions/hello-world-dcos-windows/README.md deleted file mode 100644 index c5bf8f5be..000000000 --- a/extensions/hello-world-dcos-windows/README.md +++ /dev/null @@ -1,46 +0,0 @@ -# hello-world-dcos Extension - -Sample hello-world extension. Calls the following on the master: - -``` - curl -X post http://localhost:8080/v2/apps -d "{ \"id\": \"hello-marathon\", \"cmd\": \"while [ true ] ; do echo 'Hello World' ; sleep 5 ; done\", \"cpus\": 0.1, \"mem\": 10.0, \"instances\": 1 }" -H "Content-type:application/json" -``` - -You can validate that the extension was run by running (make sure you have tunneled into the master): -``` -dcos auth login -dcos task log hello-marathon -``` - -# Configuration -|Name|Required|Acceptable Value| -|---|---|---| -|name|yes|hello-world-k8s| -|version|yes|v1| -|extensionParameters|no|| -|rootURL|optional|| - -# Example -``` javascript - "masterProfile": { - ... - "extensions": [ - { - "name": "hello-world-dcos", - "singleOrAll": "single" - } - ] - }, - ... - "extensionProfiles": [ - { - "name": "hello-world-dcos", - "version": "v1" - } - ] - - -``` - -# Supported Orchestrators -"DCOS", "DCOS173", "DCOS184", "DCOS188" \ No newline at end of file diff --git a/extensions/hello-world-dcos-windows/v1/hello-world-dcos.ps1 b/extensions/hello-world-dcos-windows/v1/hello-world-dcos.ps1 deleted file mode 100644 index dd88a0695..000000000 --- a/extensions/hello-world-dcos-windows/v1/hello-world-dcos.ps1 +++ /dev/null @@ -1,20 +0,0 @@ -# Script file to run hello-world in dcos - -#!/usr/bin/pwsh - - -Write-Host "$(date) - Starting Script" - -# Deploy container -Write-Host "$(date) - Deploying hello-world" - -$uri = "http://"+($env:DCOS_AGENT_IP)+":5051/metrics/snapshot" -while($true) { - $obj = ((Invoke-Webrequest -Method GET -URI $uri ).Content | ConvertFrom-JSON ) - Write-Host "$(date) - system/cpus_total = " ($obj.'system/cpus_total') ", mem free bytes = " ($obj.'system/mem_free_bytes') ", mem total bytes = " ($obj.'system/mem_total_bytes') - sleep 5 -} - -Write-Host "$(date) - view resources in mesos UI to validate" -Write-Host "$(date) - Script complete" - diff --git a/extensions/hello-world-dcos-windows/v1/supported-orchestrators.json b/extensions/hello-world-dcos-windows/v1/supported-orchestrators.json deleted file mode 100644 index f033603f5..000000000 --- a/extensions/hello-world-dcos-windows/v1/supported-orchestrators.json +++ /dev/null @@ -1 +0,0 @@ -["DCOS", "DCOS173", "DCOS184", "DCOS188", "DCOS190"] \ No newline at end of file diff --git a/extensions/hello-world-dcos-windows/v1/template-link.json b/extensions/hello-world-dcos-windows/v1/template-link.json deleted file mode 100644 index 049177d4d..000000000 --- a/extensions/hello-world-dcos-windows/v1/template-link.json +++ /dev/null @@ -1,33 +0,0 @@ -{ - "name": "[concat(EXTENSION_TARGET_VM_NAME_PREFIX, copyIndex(EXTENSION_LOOP_OFFSET), 'HelloWorldDcos')]", - "type": "Microsoft.Resources/deployments", - "apiVersion": "[variables('apiVersionLinkDefault')]", - "dependsOn": [ - "[resourceId('Microsoft.Compute/virtualMachines/extensions', concat(variables('masterVMNamePrefix'), sub(variables('masterCount'), 1)), 'waitforleader')]" - ], - "copy": { - "count": "EXTENSION_LOOP_COUNT", - "name": "helloWorldExtensionLoop" - }, - "properties": { - "mode": "Incremental", - "templateLink": { - "uri": "EXTENSION_URL_REPLACEextensions/hello-world-dcos-windows/v1/template.json", - "contentVersion": "1.0.0.0" - }, - "parameters": { - "artifactsLocation": { - "value": "EXTENSION_URL_REPLACE" - }, - "apiVersionDefault": { - "value": "[variables('apiVersionDefault')]" - }, - "targetVMName": { - "value": "[concat(EXTENSION_TARGET_VM_NAME_PREFIX, copyIndex(EXTENSION_LOOP_OFFSET))]" - }, - "extensionParameters": { - "value": "EXTENSION_PARAMETERS_REPLACE" - } - } - } -} diff --git a/extensions/hello-world-dcos-windows/v1/template.json b/extensions/hello-world-dcos-windows/v1/template.json deleted file mode 100644 index ef3c72085..000000000 --- a/extensions/hello-world-dcos-windows/v1/template.json +++ /dev/null @@ -1,62 +0,0 @@ -{ - "$schema": "http://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#", - "contentVersion": "1.0.0.0", - "parameters": { - "artifactsLocation": { - "type": "string", - "minLength": 1, - "metadata": { - "description": "Artifacts Location - URL" - } - }, - "apiVersionDefault": { - "type": "string", - "minLength": 1, - "metadata": { - "description": "Compute API Version" - } - }, - "targetVMName":{ - "type": "string", - "minLength": 1, - "metadata": { - "description": "Name of the vm to run the " - } - }, - "extensionParameters": { - "type": "securestring", - "minLength": 0, - "metadata": { - "description": "Custom Parameter for Extension - for hello-world, this is empty" - } - } - }, - "variables": { - "singleQuote": "'", - "initScriptUrl": "[concat(parameters('artifactsLocation'), 'extensions/hello-world-dcos-windows/v1/hello-world-dcos.ps1')]" - }, - "resources": [ - { - "apiVersion": "[parameters('apiVersionDefault')]", - "dependsOn": [], - "location": "[resourceGroup().location]", - "type": "Microsoft.Compute/virtualMachines/extensions", - "name": "[concat(parameters('targetVMName'),'/waitforleader')]", - "properties": { - "publisher": "Microsoft.OSTCExtensions", - "type": "CustomScriptForLinux", - "typeHandlerVersion": "1.5", - "autoUpgradeMinorVersion": true, - "settings": { - "fileUris": [ - "[variables('initScriptUrl')]" - ] - }, - "protectedSettings": { - "commandToExecute": "[concat('powershell \"./hello-world-dcos.ps1 ', variables('singleQuote'), parameters('extensionParameters'), variables('singleQuote'), ' >> c:/azuredata/hello-world-dcos-provision.log 2>&1 &\" &')]" - } - } - } - ], - "outputs": { } -} diff --git a/extensions/hello-world-dcos/README.md b/extensions/hello-world-dcos/README.md deleted file mode 100644 index c5bf8f5be..000000000 --- a/extensions/hello-world-dcos/README.md +++ /dev/null @@ -1,46 +0,0 @@ -# hello-world-dcos Extension - -Sample hello-world extension. Calls the following on the master: - -``` - curl -X post http://localhost:8080/v2/apps -d "{ \"id\": \"hello-marathon\", \"cmd\": \"while [ true ] ; do echo 'Hello World' ; sleep 5 ; done\", \"cpus\": 0.1, \"mem\": 10.0, \"instances\": 1 }" -H "Content-type:application/json" -``` - -You can validate that the extension was run by running (make sure you have tunneled into the master): -``` -dcos auth login -dcos task log hello-marathon -``` - -# Configuration -|Name|Required|Acceptable Value| -|---|---|---| -|name|yes|hello-world-k8s| -|version|yes|v1| -|extensionParameters|no|| -|rootURL|optional|| - -# Example -``` javascript - "masterProfile": { - ... - "extensions": [ - { - "name": "hello-world-dcos", - "singleOrAll": "single" - } - ] - }, - ... - "extensionProfiles": [ - { - "name": "hello-world-dcos", - "version": "v1" - } - ] - - -``` - -# Supported Orchestrators -"DCOS", "DCOS173", "DCOS184", "DCOS188" \ No newline at end of file diff --git a/extensions/hello-world-dcos/v1/hello-world-dcos.sh b/extensions/hello-world-dcos/v1/hello-world-dcos.sh deleted file mode 100644 index ef0b9da08..000000000 --- a/extensions/hello-world-dcos/v1/hello-world-dcos.sh +++ /dev/null @@ -1,16 +0,0 @@ -# Script file to run hello-world in dcos - -#!/bin/bash - -set -e - -echo $(date) " - Starting Script" - -# Deploy container -echo $(date) " - Deploying hello-world" - -curl -X post http://localhost:8080/v2/apps -d "{ \"id\": \"hello-marathon\", \"cmd\": \"while [ true ] ; do echo 'Hello World' ; sleep 5 ; done\", \"cpus\": 0.1, \"mem\": 10.0, \"instances\": 1 }" -H "Content-type:application/json" - -echo $(date) " - view applications in marathon UI to validate" -echo $(date) " - Script complete" - diff --git a/extensions/hello-world-dcos/v1/supported-orchestrators.json b/extensions/hello-world-dcos/v1/supported-orchestrators.json deleted file mode 100644 index f033603f5..000000000 --- a/extensions/hello-world-dcos/v1/supported-orchestrators.json +++ /dev/null @@ -1 +0,0 @@ -["DCOS", "DCOS173", "DCOS184", "DCOS188", "DCOS190"] \ No newline at end of file diff --git a/extensions/hello-world-dcos/v1/template-link.json b/extensions/hello-world-dcos/v1/template-link.json deleted file mode 100644 index 2058956b5..000000000 --- a/extensions/hello-world-dcos/v1/template-link.json +++ /dev/null @@ -1,33 +0,0 @@ -{ - "name": "[concat(EXTENSION_TARGET_VM_NAME_PREFIX, copyIndex(EXTENSION_LOOP_OFFSET), 'HelloWorldDcos')]", - "type": "Microsoft.Resources/deployments", - "apiVersion": "[variables('apiVersionLinkDefault')]", - "dependsOn": [ - "[resourceId('Microsoft.Compute/virtualMachines/extensions', concat(variables('masterVMNamePrefix'), sub(variables('masterCount'), 1)), 'waitforleader')]" - ], - "copy": { - "count": "EXTENSION_LOOP_COUNT", - "name": "helloWorldExtensionLoop" - }, - "properties": { - "mode": "Incremental", - "templateLink": { - "uri": "EXTENSION_URL_REPLACEextensions/hello-world-dcos/v1/template.json", - "contentVersion": "1.0.0.0" - }, - "parameters": { - "artifactsLocation": { - "value": "EXTENSION_URL_REPLACE" - }, - "apiVersionDefault": { - "value": "[variables('apiVersionDefault')]" - }, - "targetVMName": { - "value": "[concat(EXTENSION_TARGET_VM_NAME_PREFIX, copyIndex(EXTENSION_LOOP_OFFSET))]" - }, - "extensionParameters": { - "value": "EXTENSION_PARAMETERS_REPLACE" - } - } - } -} diff --git a/extensions/hello-world-dcos/v1/template.json b/extensions/hello-world-dcos/v1/template.json deleted file mode 100644 index 5f4d9d92e..000000000 --- a/extensions/hello-world-dcos/v1/template.json +++ /dev/null @@ -1,62 +0,0 @@ -{ - "$schema": "http://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#", - "contentVersion": "1.0.0.0", - "parameters": { - "artifactsLocation": { - "type": "string", - "minLength": 1, - "metadata": { - "description": "Artifacts Location - URL" - } - }, - "apiVersionDefault": { - "type": "string", - "minLength": 1, - "metadata": { - "description": "Compute API Version" - } - }, - "targetVMName":{ - "type": "string", - "minLength": 1, - "metadata": { - "description": "Name of the vm to run the " - } - }, - "extensionParameters": { - "type": "securestring", - "minLength": 0, - "metadata": { - "description": "Custom Parameter for Extension - for hello-world, this is empty" - } - } - }, - "variables": { - "singleQuote": "'", - "initScriptUrl": "[concat(parameters('artifactsLocation'), 'extensions/hello-world-dcos/v1/hello-world-dcos.sh')]" - }, - "resources": [ - { - "apiVersion": "[parameters('apiVersionDefault')]", - "dependsOn": [], - "location": "[resourceGroup().location]", - "type": "Microsoft.Compute/virtualMachines/extensions", - "name": "[concat(parameters('targetVMName'),'/waitforleader')]", - "properties": { - "publisher": "Microsoft.OSTCExtensions", - "type": "CustomScriptForLinux", - "typeHandlerVersion": "1.5", - "autoUpgradeMinorVersion": true, - "settings": { - "fileUris": [ - "[variables('initScriptUrl')]" - ] - }, - "protectedSettings": { - "commandToExecute": "[concat('/bin/bash -c \"/bin/bash ./hello-world-dcos.sh ', variables('singleQuote'), parameters('extensionParameters'), variables('singleQuote'), ' >> /var/log/azure/hello-world-dcos-provision.log 2>&1 &\" &')]" - } - } - } - ], - "outputs": { } -} diff --git a/extensions/vamp-dcos/README.md b/extensions/vamp-dcos/README.md deleted file mode 100644 index a0a8f5369..000000000 --- a/extensions/vamp-dcos/README.md +++ /dev/null @@ -1,38 +0,0 @@ -# vamp-dcos Extension - -Installs VAMP 0.9.4 as per the [VAMP Standard Install](http://vamp.io/documentation/installation/v0.9.4/dcos/#standard-install). -Should only be ran on a single master after the waitforall extension has succeeded - -# Configuration -|Name|Required|Acceptable Value| -|---|---|---| -|name|yes|vamp-dcos| -|version|yes|v1| -|extensionParameters|no|| -|rootURL|optional|| -|singleOrAll|Required|single| - -# Example -```javascript - "masterProfile": { - ... - "extensions": [ - { - "name": "vamp-dcos", - "singleOrAll": "single" - } - ... - ] - }, - ... - "extensionProfiles": [ - { - "name": "vamp-dcos", - "version": "v1" - } - ] - -``` - -# Supported Orchestrators -DCOS \ No newline at end of file diff --git a/extensions/vamp-dcos/v1/supported-orchestrators.json b/extensions/vamp-dcos/v1/supported-orchestrators.json deleted file mode 100644 index af2afb8c6..000000000 --- a/extensions/vamp-dcos/v1/supported-orchestrators.json +++ /dev/null @@ -1 +0,0 @@ -["DCOS", "DCOS173", "DCOS184", "DCOS188"] \ No newline at end of file diff --git a/extensions/vamp-dcos/v1/template-link.json b/extensions/vamp-dcos/v1/template-link.json deleted file mode 100644 index 67de07ac4..000000000 --- a/extensions/vamp-dcos/v1/template-link.json +++ /dev/null @@ -1,33 +0,0 @@ -{ - "name": "[concat(EXTENSION_TARGET_VM_NAME_PREFIX, copyIndex(EXTENSION_LOOP_OFFSET), 'VampDcosExtension')]", - "type": "Microsoft.Resources/deployments", - "apiVersion": "[variables('apiVersionLinkDefault')]", - "dependsOn": [ - "[resourceId('Microsoft.Compute/virtualMachines/extensions', concat(variables('masterVMNamePrefix'), sub(variables('masterCount'), 1)), 'waitforleader')]" - ], - "copy": { - "count": "EXTENSION_LOOP_COUNT", - "name": "vampExtensionLoop" - }, - "properties": { - "mode": "Incremental", - "templateLink": { - "uri": "EXTENSION_URL_REPLACEextensions/vamp-dcos/v1/template.json", - "contentVersion": "1.0.0.0" - }, - "parameters": { - "artifactsLocation": { - "value": "EXTENSION_URL_REPLACE" - }, - "apiVersionDefault": { - "value": "[variables('apiVersionDefault')]" - }, - "targetVMName": { - "value": "[concat(EXTENSION_TARGET_VM_NAME_PREFIX, copyIndex(EXTENSION_LOOP_OFFSET))]" - }, - "extensionParameters": { - "value": "EXTENSION_PARAMETERS_REPLACE" - } - } - } -} diff --git a/extensions/vamp-dcos/v1/template.json b/extensions/vamp-dcos/v1/template.json deleted file mode 100644 index b50754c83..000000000 --- a/extensions/vamp-dcos/v1/template.json +++ /dev/null @@ -1,62 +0,0 @@ -{ - "$schema": "http://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#", - "contentVersion": "1.0.0.0", - "parameters": { - "artifactsLocation": { - "type": "string", - "minLength": 1, - "metadata": { - "description": "Artifacts Location - URL" - } - }, - "apiVersionDefault": { - "type": "string", - "minLength": 1, - "metadata": { - "description": "Compute API Version" - } - }, - "targetVMName":{ - "type": "string", - "minLength": 1, - "metadata": { - "description": "Name of the vm to run the " - } - }, - "extensionParameters": { - "type": "securestring", - "minLength": 0, - "metadata": { - "description": "Custom Parameter for Extension - for VAMP, this is currently empty" - } - } - }, - "variables": { - "singleQuote": "'", - "initScriptUrl": "[concat(parameters('artifactsLocation'), 'extensions/vamp-dcos/v1/vamp-dcos.sh')]" - }, - "resources": [ - { - "apiVersion": "[parameters('apiVersionDefault')]", - "dependsOn": [], - "location": "[resourceGroup().location]", - "type": "Microsoft.Compute/virtualMachines/extensions", - "name": "[concat(parameters('targetVMName'),'/waitforleader')]", - "properties": { - "publisher": "Microsoft.OSTCExtensions", - "type": "CustomScriptForLinux", - "typeHandlerVersion": "1.5", - "autoUpgradeMinorVersion": true, - "settings": { - "fileUris": [ - "[variables('initScriptUrl')]" - ] - }, - "protectedSettings": { - "commandToExecute": "[concat('/bin/bash -c \"/bin/bash ./vamp-dcos.sh ', variables('singleQuote'), parameters('extensionParameters'), variables('singleQuote'), ' >> /var/log/azure/vamp-dcos-provision.log 2>&1 &\" &')]" - } - } - } - ], - "outputs": { } -} diff --git a/extensions/vamp-dcos/v1/vamp-dcos.sh b/extensions/vamp-dcos/v1/vamp-dcos.sh deleted file mode 100644 index e0f737019..000000000 --- a/extensions/vamp-dcos/v1/vamp-dcos.sh +++ /dev/null @@ -1,91 +0,0 @@ -# baseUrl="http://localhost:8080/marathon" # handy for local testing with SSH -baseUrl="http://marathon.mesos:8080" - -# definitions for elasticsearch and vamp applications (from http://vamp.io/documentation/installation/v0.9.3/dcos/) -elasticsearch='{"id":"elasticsearch","instances":1,"cpus":0.2,"mem":1024,"container":{"docker":{"image":"magneticio/elastic:2.2","network":"HOST","forcePullImage":true}},"healthChecks":[{"protocol":"TCP","gracePeriodSeconds":30,"intervalSeconds":10,"timeoutSeconds":5,"port":9200,"maxConsecutiveFailures":0}]}' -vamp='{"id":"vamp/vamp","instances":1,"cpus":0.5,"mem":1024,"container":{"type":"DOCKER","docker":{"image":"magneticio/vamp:0.9.4-dcos","network":"BRIDGE","portMappings":[{"containerPort":8080,"hostPort":0,"name":"vip0","labels":{"VIP_0":"10.20.0.100:8080"}}],"forcePullImage":true}},"labels":{"DCOS_SERVICE_NAME":"vamp","DCOS_SERVICE_SCHEME":"http","DCOS_SERVICE_PORT_INDEX":"0"},"env":{"VAMP_WAIT_FOR":"http://elasticsearch.marathon.mesos:9200/.kibana","VAMP_WORKFLOW_DRIVER_VAMP_URL":"http://10.20.0.100:8080","VAMP_ELASTICSEARCH_URL":"http://elasticsearch.marathon.mesos:9200"},"healthChecks":[{"protocol":"TCP","gracePeriodSeconds":30,"intervalSeconds":10,"timeoutSeconds":5,"portIndex":0,"maxConsecutiveFailures":0}]}' - - -function wait_for_running_app(){ - ## args - ## $1 - app name - appname=$1 - - ## wait for deployment - waitCount=0 - appRunning=0 - while [ $waitCount -lt 12 ] - do - echo "Testing for $appname running..." - appResponse=$(curl "$baseUrl/v2/apps/$appname" 2>/dev/null) # url for $appname app - if [[ $appResponse =~ \"state\":\"TASK_RUNNING\" ]]; then # test for TASK_RUNNING - echo "$appname running!" - appRunning=1 - return 0 - fi - - sleep 10s - waitCount=$[$waitCount+1] - done - return 1 -} - -## Start elasticsearch deployment -echo "Starting elasticsearch deployment" -curl -X POST "$baseUrl/v2/apps" -H 'Content-Type: application/json' -d $elasticsearch -echo "" - -wait_for_running_app "elasticsearch" -elasticRunning=$? - -if [[ $elasticRunning -ne 0 ]]; then - echo "elasticsearch not running - quitting" - exit 100 -fi - -## Start vamp deployment -echo "Starting vamp deployment" -curl -X POST "$baseUrl/v2/apps" -H 'Content-Type: application/json' -d $vamp -echo "" - -wait_for_running_app "vamp/vamp" -running=$? -if [[ $running -ne 0 ]]; then - echo "vamp/vamp not running - quitting" - exit 100 -fi - -wait_for_running_app "vamp/vamp-gateway-agent" -running=$? -if [[ $running -ne 0 ]]; then - echo "vamp/vamp-gateway-agent not running - quitting" - exit 100 -fi - -wait_for_running_app "vamp/workflow-health" -running=$? -if [[ $running -ne 0 ]]; then - echo "vamp/workflow-health not running - quitting" - exit 100 -fi - -wait_for_running_app "vamp/workflow-kibana" -running=$? -if [[ $running -ne 0 ]]; then - echo "vamp/workflow-kibana not running - quitting" - exit 100 -fi - -wait_for_running_app "vamp/workflow-metrics" -running=$? -if [[ $running -ne 0 ]]; then - echo "vamp/workflow-metrics not running - quitting" - exit 100 -fi - -wait_for_running_app "vamp/workflow-vga" -running=$? -if [[ $running -ne 0 ]]; then - echo "vamp/workflow-vga not running - quitting" - exit 100 -fi diff --git a/labels.yaml b/labels.yaml index fb5557e0b..79f983072 100644 --- a/labels.yaml +++ b/labels.yaml @@ -36,14 +36,8 @@ labels: color: fbca04 - name: needs more information color: d93f0b -- name: orchestrator/dcos - color: fbca04 - name: orchestrator/k8s color: 2e64d2 -- name: orchestrator/swarm - color: "5319e7" -- name: orchestrator/swarmmode - color: 006b75 - name: priority/P0 color: b60205 - name: priority/P1 diff --git a/releases/Dockerfile.linux b/releases/Dockerfile.linux index f8ec0f6ae..fbb95da73 100644 --- a/releases/Dockerfile.linux +++ b/releases/Dockerfile.linux @@ -7,10 +7,10 @@ ARG BUILD_DATE LABEL maintainer="Microsoft" \ org.label-schema.schema-version="1.0" \ org.label-schema.vendor="Microsoft" \ - org.label-schema.name="Azure Container Service Engine (aks-engine)" \ + org.label-schema.name="Azure Kubernetes Engine (aks-engine)" \ org.label-schema.version=$AKSENGINE_VERSION \ org.label-schema.license="MIT" \ - org.label-schema.description="The Azure Container Service Engine (aks-engine) generates ARM (Azure Resource Manager) templates for Docker enabled clusters on Microsoft Azure with your choice of DCOS, Kubernetes, or Swarm orchestrators." \ + org.label-schema.description="The Azure Kubernetes Engine (aks-engine) generates ARM (Azure Resource Manager) templates for Kubernetes clusters on Microsoft Azure with your choice of DCOS, Kubernetes, or Swarm orchestrators." \ org.label-schema.url="https://github.com/Azure/aks-engine" \ org.label-schema.usage="https://github.com/Azure/aks-engine/blob/master/docs/acsengine.md" \ org.label-schema.build-date=$BUILD_DATE \ diff --git a/releases/README.Dockerfile.md b/releases/README.Dockerfile.md index 34e3bbff7..d07640c85 100644 --- a/releases/README.Dockerfile.md +++ b/releases/README.Dockerfile.md @@ -19,10 +19,10 @@ $ docker image inspect microsoft/aks-engine:0.16.0 --format "{{json .Config.Labe { "maintainer": "Microsoft", "org.label-schema.build-date": "2017-10-25T04:35:06Z", - "org.label-schema.description": "The Azure Container Service Engine (aks-engine) generates ARM (Azure Resource Manager) templates for Docker enabled clusters on Microsoft Azure with your choice of DCOS, Kubernetes, or Swarm orchestrators.", + "org.label-schema.description": "The Azure Kubernetes Engine (aks-engine) generates ARM (Azure Resource Manager) templates for Kubernetes clusters on Microsoft Azure with your choice of DCOS, Kubernetes, or Swarm orchestrators.", "org.label-schema.docker.cmd": "docker run -v ${PWD}:/aks-engine/workspace -it --rm microsoft/aks-engine:0.16.0", "org.label-schema.license": "MIT", - "org.label-schema.name": "Azure Container Service Engine (aks-engine)", + "org.label-schema.name": "Azure Kubernetes Engine (aks-engine)", "org.label-schema.schema-version": "1.0", "org.label-schema.url": "https://github.com/Azure/aks-engine", "org.label-schema.usage": "https://github.com/Azure/aks-engine/blob/master/docs/acsengine.md", @@ -38,10 +38,10 @@ PS> docker image inspect microsoft/aks-engine:0.16.0 --format "{{json .Config.La { "maintainer": "Microsoft", "org.label-schema.build-date": "2017-10-25T04:35:06Z", - "org.label-schema.description": "The Azure Container Service Engine (aks-engine) generates ARM (Azure Resource Manager) templates for Docker enabled clusters on Microsoft Azure with your choice of DCOS, Kubernetes, or Swarm orchestrators.", + "org.label-schema.description": "The Azure Kubernetes Engine (aks-engine) generates ARM (Azure Resource Manager) templates for Kubernetes clusters on Microsoft Azure with your choice of DCOS, Kubernetes, or Swarm orchestrators.", "org.label-schema.docker.cmd": "docker run -v ${PWD}:/aks-engine/workspace -it --rm microsoft/aks-engine:0.16.0", "org.label-schema.license": "MIT", - "org.label-schema.name": "Azure Container Service Engine (aks-engine)", + "org.label-schema.name": "Azure Kubernetes Engine (aks-engine)", "org.label-schema.schema-version": "1.0", "org.label-schema.url": "https://github.com/Azure/aks-engine", "org.label-schema.usage": "https://github.com/Azure/aks-engine/blob/master/docs/acsengine.md",