Azure Arc-enabled Kubernetes agent overview
Azure Arc-enabled Kubernetes provides a centralized, consistent control plane to manage policy, governance, and security across Kubernetes clusters in different environments.
Azure Arc agents are deployed on Kubernetes clusters when you connect them to Azure Arc. This article provides an overview of these agents.
Deploy agents to your cluster
Most on-premises datacenters enforce strict network rules that prevent inbound communication on the network boundary firewall. Azure Arc-enabled Kubernetes works with these restrictions by not requiring inbound ports on the firewall. Azure Arc agents require outbound communication to a set list of network endpoints.
This diagram provides a high-level view of Azure Arc components. Kubernetes clusters in on-premises datacenters or different clouds are connected to Azure through the Azure Arc agents. This allows the clusters to be managed in Azure using management tools and Azure services. The clusters can also be accessed through offline management tools.
The following high-level steps are involved in connecting a Kubernetes cluster to Azure Arc:
Create a Kubernetes cluster on your choice of infrastructure (VMware vSphere, Amazon Web Services, Google Cloud Platform, etc.). The cluster must already exist before you connect it to Azure Arc.
Start the Azure Arc registration for your cluster.
The agent Helm chart is deployed on the cluster.
The cluster nodes initiate an outbound communication to the Microsoft Container Registry, pulling the images needed to create the following agents in the
Azure Arc-enabled Kubernetes currently supports only system assigned identities.
clusteridentityoperatorinitiates the first outbound communication. This first communication fetches the Managed Service Identity (MSI) certificate used by other agents for communication with Azure.
Watches the connected cluster for source control configuration resources applied on the cluster. Updates the compliance state.
An operator of operators that orchestrates interactions between Azure Arc components.
Collects metrics of other Arc agents to verify optimal performance.
Gathers cluster metadata, including cluster version, node count, and Azure Arc agent version.
Syncs the above-mentioned cluster metadata to Azure.
Collects logs from the Flux operators deployed as a part of source control configuration.
Installs and manages lifecycle of extension Helm charts.
Used for authentication of requests sent to the cluster using cluster connect.
Reverse proxy agent that enables the cluster connect feature to provide access to
apiserverof the cluster. Optional component deployed only if the cluster connect feature is enabled.
Authentication and authorization webhook server used for Azure Active Directory (Azure AD) RBAC. Optional component deployed only if Azure RBAC is enabled on the cluster.
Once all the Azure Arc-enabled Kubernetes agent pods are in
Runningstate, verify that your cluster is connected to Azure Arc. You should see:
- An Azure Arc-enabled Kubernetes resource in Azure Resource Manager. Azure tracks this resource as a projection of the customer-managed Kubernetes cluster, not the actual Kubernetes cluster itself.
- Cluster metadata (such as Kubernetes version, agent version, and number of nodes) appearing on the Azure Arc-enabled Kubernetes resource as metadata.
- Walk through our quickstart to connect a Kubernetes cluster to Azure Arc.
- View release notes to see details about the latest agent versions.
- Learn about upgrading Azure Arc-enabled Kubernetes agents.
- Learn more about the creating connections between your cluster and a Git repository as a configuration resource with Azure Arc-enabled Kubernetes.