Skip to content

Commit 3a3e486

Browse files
gal-ofir-msfengzhou-msftkairu-ms
authored
[AKS] Revert azure defender addon changes from AKS-Preview (Azure#3474)
* Added azureDefender addon to aks-preview * added history.md note * Update src/aks-preview/HISTORY.md * Revert AzureDefender addon changes from AKS Preview * finalize revert aks azure defender addon changes * resolved comments * Trigger Build * Update src/aks-preview/azext_aks_preview/custom.py Co-authored-by: kai ru <69238381+kairu-ms@users.noreply.github.com> * Update setup.py * Update HISTORY.md * Update HISTORY.md * Update setup.py * Update HISTORY.md * Update HISTORY.md * Update setup.py Co-authored-by: Feng Zhou <55177366+fengzhou-msft@users.noreply.github.com> Co-authored-by: kai ru <69238381+kairu-ms@users.noreply.github.com>
1 parent d654c65 commit 3a3e486

File tree

5 files changed

+15
-27
lines changed

5 files changed

+15
-27
lines changed

src/aks-preview/HISTORY.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,10 @@
22

33
Release History
44
===============
5+
0.5.19
6+
+++++
7+
* Remove azure-defender from list of available addons to install via `az aks enable-addons` command
8+
59
0.5.18
610
+++++
711
* Fix issue with node config not consuming logging settings

src/aks-preview/azext_aks_preview/_consts.py

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -64,12 +64,7 @@
6464
CONST_AZURE_KEYVAULT_SECRETS_PROVIDER_ADDON_NAME = "azureKeyvaultSecretsProvider"
6565
CONST_SECRET_ROTATION_ENABLED = "enableSecretRotation"
6666

67-
# Azure Defender addon configuration keys
68-
CONST_AZURE_DEFENDER_ADDON_NAME = "azureDefender"
69-
CONST_AZURE_DEFENDER_LOG_ANALYTICS_WORKSPACE_RESOURCE_ID = CONST_MONITORING_LOG_ANALYTICS_WORKSPACE_RESOURCE_ID
70-
7167
ADDONS = {
72-
'azure-defender': CONST_AZURE_DEFENDER_ADDON_NAME,
7368
'http_application_routing': CONST_HTTP_APPLICATION_ROUTING_ADDON_NAME,
7469
'monitoring': CONST_MONITORING_ADDON_NAME,
7570
'virtual-node': CONST_VIRTUAL_NODE_ADDON_NAME,

src/aks-preview/azext_aks_preview/_help.py

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -171,7 +171,6 @@
171171
open-service-mesh - enable Open Service Mesh addon (PREVIEW).
172172
gitops - enable GitOps (PREVIEW).
173173
azure-keyvault-secrets-provider - enable Azure Keyvault Secrets Provider addon (PREVIEW).
174-
azure-defender - enable Azure Defender addon (PREVIEW).
175174
- name: --disable-rbac
176175
type: bool
177176
short-summary: Disable Kubernetes Role-Based Access Control.
@@ -386,7 +385,6 @@
386385
text: az aks create -g MyResourceGroup -n MyManagedCluster --enable-aad --enable-azure-rbac
387386
- name: Create a kubernetes cluster with a specific os-sku
388387
text: az aks create -g MyResourceGroup -n MyManagedCluster --os-sku Ubuntu
389-
390388
""".format(sp_cache=AKS_SERVICE_PRINCIPAL_CACHE)
391389

392390
helps['aks scale'] = """
@@ -1037,8 +1035,6 @@
10371035
open-service-mesh - enable Open Service Mesh addon (PREVIEW).
10381036
gitops - enable GitOps (PREVIEW).
10391037
azure-keyvault-secrets-provider - enable Azure Keyvault Secrets Provider addon (PREVIEW).
1040-
azure-defender - enable Azure Defender addon (PREVIEW).
1041-
10421038
parameters:
10431039
- name: --addons -a
10441040
type: string
@@ -1083,9 +1079,6 @@
10831079
- name: Enable open-service-mesh addon.
10841080
text: az aks enable-addons --name MyManagedCluster --resource-group MyResourceGroup --addons open-service-mesh
10851081
crafted: true
1086-
- name: Enable azure-defender addon with workspace resourceId.
1087-
text: az aks enable-addons --name MyManagedCluster --resource-group MyResourceGroup --addons azure-defender --workspace-resource-id WorkspaceResourceId
1088-
crafted: true
10891082
"""
10901083

10911084
helps['aks get-versions'] = """

src/aks-preview/azext_aks_preview/custom.py

Lines changed: 10 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,6 @@
114114
from ._consts import CONST_CONFCOM_ADDON_NAME, CONST_ACC_SGX_QUOTE_HELPER_ENABLED
115115
from ._consts import CONST_OPEN_SERVICE_MESH_ADDON_NAME
116116
from ._consts import CONST_AZURE_KEYVAULT_SECRETS_PROVIDER_ADDON_NAME, CONST_SECRET_ROTATION_ENABLED
117-
from ._consts import CONST_AZURE_DEFENDER_ADDON_NAME, CONST_AZURE_DEFENDER_LOG_ANALYTICS_WORKSPACE_RESOURCE_ID
118117
from ._consts import CONST_MANAGED_IDENTITY_OPERATOR_ROLE, CONST_MANAGED_IDENTITY_OPERATOR_ROLE_ID
119118
from ._consts import ADDONS
120119
from .maintenanceconfiguration import aks_maintenanceconfiguration_update_internal
@@ -2408,24 +2407,21 @@ def _handle_addons_args(cmd, # pylint: disable=too-many-statements
24082407
enabled=True)
24092408
addons.remove('kube-dashboard')
24102409
# TODO: can we help the user find a workspace resource ID?
2411-
if 'monitoring' in addons or 'azure-defender' in addons:
2410+
if 'monitoring' in addons:
24122411
if not workspace_resource_id:
24132412
# use default workspace if exists else create default workspace
24142413
workspace_resource_id = _ensure_default_log_analytics_workspace_for_monitoring(
24152414
cmd, subscription_id, resource_group_name)
24162415

24172416
workspace_resource_id = _sanitize_loganalytics_ws_resource_id(workspace_resource_id)
24182417

2419-
if 'monitoring' in addons:
2420-
addon_profiles[CONST_MONITORING_ADDON_NAME] = ManagedClusterAddonProfile(enabled=True, config={CONST_MONITORING_LOG_ANALYTICS_WORKSPACE_RESOURCE_ID: workspace_resource_id})
2421-
addons.remove('monitoring')
2422-
if 'azure-defender' in addons:
2423-
addon_profiles[CONST_AZURE_DEFENDER_ADDON_NAME] = ManagedClusterAddonProfile(enabled=True, config={CONST_AZURE_DEFENDER_LOG_ANALYTICS_WORKSPACE_RESOURCE_ID: workspace_resource_id})
2424-
addons.remove('azure-defender')
2425-
# error out if '--enable-addons=monitoring/azure-defender' isn't set but workspace_resource_id is
2418+
addon_profiles[CONST_MONITORING_ADDON_NAME] = ManagedClusterAddonProfile(enabled=True, config={CONST_MONITORING_LOG_ANALYTICS_WORKSPACE_RESOURCE_ID: workspace_resource_id})
2419+
addons.remove('monitoring')
2420+
2421+
# error out if '--enable-addons=monitoring' isn't set but workspace_resource_id is
24262422
elif workspace_resource_id:
24272423
raise CLIError(
2428-
'"--workspace-resource-id" requires "--enable-addons [monitoring/azure-defender]".')
2424+
'"--workspace-resource-id" requires "--enable-addons monitoring".')
24292425
if 'azure-policy' in addons:
24302426
addon_profiles[CONST_AZURE_POLICY_ADDON_NAME] = ManagedClusterAddonProfile(
24312427
enabled=True)
@@ -3383,11 +3379,11 @@ def _update_addons(cmd, # pylint: disable=too-many-branches,too-many-statements
33833379
addon_profile = addon_profiles.get(
33843380
addon, ManagedClusterAddonProfile(enabled=False))
33853381
# special config handling for certain addons
3386-
if addon in [CONST_MONITORING_ADDON_NAME, CONST_AZURE_DEFENDER_ADDON_NAME]:
3387-
logAnalyticsConstName = CONST_MONITORING_LOG_ANALYTICS_WORKSPACE_RESOURCE_ID if addon == CONST_MONITORING_ADDON_NAME else CONST_AZURE_DEFENDER_LOG_ANALYTICS_WORKSPACE_RESOURCE_ID
3382+
if addon == CONST_MONITORING_ADDON_NAME:
3383+
logAnalyticsConstName = CONST_MONITORING_LOG_ANALYTICS_WORKSPACE_RESOURCE_ID
33883384
if addon_profile.enabled:
3389-
raise CLIError(f'The {addon} addon is already enabled for this managed cluster.\n'
3390-
f'To change {addon} configuration, run "az aks disable-addons -a {addon}"'
3385+
raise CLIError('The monitoring addon is already enabled for this managed cluster.\n'
3386+
'To change monitoring configuration, run "az aks disable-addons -a monitoring"'
33913387
'before enabling it again.')
33923388
if not workspace_resource_id:
33933389
workspace_resource_id = _ensure_default_log_analytics_workspace_for_monitoring(

src/aks-preview/setup.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
from codecs import open as open1
99
from setuptools import setup, find_packages
1010

11-
VERSION = "0.5.18"
11+
VERSION = "0.5.19"
1212
CLASSIFIERS = [
1313
'Development Status :: 4 - Beta',
1414
'Intended Audience :: Developers',

0 commit comments

Comments
 (0)