Proposed Pull Request Change

title description author ms.author ms.service ms.topic ms.date
Deploy Arc-enabled workloads in an Extended Zone: ContainerApps Learn how to deploy arc-enabled ContainerApps in an Extended Zone. svaldesgzz svaldes azure-extended-zones how-to 05/02/2025
📄 Document Links
GitHub View on GitHub Microsoft Learn View on Microsoft Learn
Raw New Markdown
Generating updated version of doc...
Rendered New Markdown
Generating updated version of doc...
+0 -0
+0 -0
--- title: "Deploy Arc-enabled workloads in an Extended Zone: ContainerApps" description: Learn how to deploy arc-enabled ContainerApps in an Extended Zone. author: svaldesgzz ms.author: svaldes ms.service: azure-extended-zones ms.topic: how-to ms.date: 05/02/2025 # Customer intent: As a cloud administrator and Azure Extended Zones user, I want a quick method to deploy PaaS services via Arc in an Azure Extended Zone. --- # Deploy Arc-enabled workloads in an Extended Zone: ContainerApps In this article, you'll learn how to deploy an Arc-enabled ContainerApp in an Extended Zone. Refer to [What is Azure Extended Zones? | Services](/azure/extended-zones/overview#services) for currently supported PaaS workloads. Feel free to explore [Container Apps on Azure Arc Overview | Microsoft Learn](/azure/container-apps/azure-arc-overview) to become more familiar with Container Apps on Azure Arc. ## Prerequisites - [An Azure account](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn) with an active subscription. - Install the [Azure CLI](/cli/azure/install-azure-cli). - Access to a public or private container registry, such as the [Azure Container Registry](/azure/container-registry/). - [An Azure Arc-enabled Kubernetes cluster set up in Extended Zones](/azure/extended-zones/arc-enabled-workloads-arc-enabled-aks-cluster). > [!NOTE] > Use the intended Extended Location as your location variable. ## Getting started If you're already familiar with the subject, you may skip this paragraph. Here are important topics you may want read before you proceed with creation: - [Requirements and limitations](/azure/container-apps/azure-arc-overview) of the public preview. Of particular importance are the cluster requirements. - [Overview of Azure Arc-enabled data services](/azure/azure-arc/data/overview) - [Connectivity modes and requirements](/azure/azure-arc/data/connectivity) - [Storage configuration and Kubernetes storage concepts](/azure/azure-arc/data/storage-configuration) - [Kubernetes resource model](https://github.com/kubernetes/design-proposals-archive/blob/main/scheduling/resources.md#resource-quantities) ### Create Container Apps on Arc-enabled AKS in Extended Zones Now that the Arc-enabled AKS cluster is created, we can proceed to using the following PowerShell script to create our Container App on an AKS cluster in an Extended Zone and connect it to the Azure Arc-enabled Kubernetes. > [!NOTE] > Make sure to transfer the parameters from the Arc-enabled AKS steps correctly into the script. ```powershell # . "./CreateArcEnabledAksOnEZ.ps1" # Create a container app on an AKS cluster in an edge zone and connect it to Azure Arc-enabled Kubernetes function CreateContainerAppOnArcEnabledAksEz { param( [string] $AKSClusterResourceGroupName, [string] $location = "westus", [string] $AKSName, [string] $edgeZone, [int] $nodeCount = 2, [string] $vmSize = "standard_nv12ads_a10_v5", [string] $ArcResourceGroupName, [string] $CONNECTED_ENVIRONMENT_NAME, [string] $CUSTOM_LOCATION_NAME, [string] $SubscriptionId, [string] $ACRName, [string] $imageName, [switch] $Debug ) try { # Set the subscription az account set --subscription $SubscriptionId # Create the Arc-enabled EZ AKS cluster createArcEnabledAksOnEz -SubscriptionId $SubscriptionId -AKSClusterResourceGroupName $AKSClusterResourceGroupName -location $location -AKSName $AKSName -edgeZone $edgeZone -nodeCount $nodeCount -vmSize $vmSize -ArcResourceGroupName $ArcResourceGroupName -Debug:$Debug # Install container apps extension $CLUSTER_NAME = "$ArcResourceGroupName-cluster" # Name of the connected cluster resource $EXTENSION_NAME="appenv-ext" $NAMESPACE="app-ns" az k8s-extension create ` --resource-group $ArcResourceGroupName ` --name $EXTENSION_NAME ` --cluster-type connectedClusters ` --cluster-name $CLUSTER_NAME ` --extension-type 'Microsoft.App.Environment' ` --release-train stable ` --auto-upgrade-minor-version true ` --scope cluster ` --release-namespace $NAMESPACE ` --configuration-settings "Microsoft.CustomLocation.ServiceAccount=default" ` --configuration-settings "appsNamespace=${NAMESPACE}" ` --configuration-settings "clusterName=${CONNECTED_ENVIRONMENT_NAME}" ` --configuration-settings "envoy.annotations.service.beta.kubernetes.io/azure-load-balancer-resource-group=${AKSClusterResourceGroupName}" # Save id property of the Container Apps extension for later $EXTENSION_ID=$(az k8s-extension show ` --cluster-type connectedClusters ` --cluster-name $CLUSTER_NAME ` --resource-group $ArcResourceGroupName ` --name $EXTENSION_NAME ` --query id ` --output tsv) # Wait for extension to fully install before proceeding az resource wait --ids $EXTENSION_ID --custom "properties.provisioningState!='Pending'" --api-version "2020-07-01-preview" $CONNECTED_CLUSTER_ID=$(az connectedk8s show --resource-group $ArcResourceGroupName --name $CLUSTER_NAME --query id --output tsv) az customlocation create ` --resource-group $ArcResourceGroupName ` --name $CUSTOM_LOCATION_NAME ` --host-resource-id $CONNECTED_CLUSTER_ID ` --namespace $NAMESPACE ` --cluster-extension-ids $EXTENSION_ID # DEBUG: Test custom location creation if ($Debug) { Write-Debug az customlocation show --resource-group $ArcResourceGroupName --name $CUSTOM_LOCATION_NAME } # Save id property of the custom location for later $CUSTOM_LOCATION_ID=$(az customlocation show ` --resource-group $ArcResourceGroupName ` --name $CUSTOM_LOCATION_NAME ` --query id ` --output tsv) # Create container Apps connected environment az containerapp connected-env create ` --resource-group $ArcResourceGroupName ` --name $CONNECTED_ENVIRONMENT_NAME ` --custom-location $CUSTOM_LOCATION_ID ` --location eastus # DEBUG: validate that the connected environment is successfully created if ($Debug) { Write-Debug az containerapp connected-env show --resource-group $ArcResourceGroupName --name $CONNECTED_ENVIRONMENT_NAME } # Create a new resource group for the container app $myResourceGroup="${imageName}-resource-group" az group create --name $myResourceGroup --location eastus # Get the custom location id $customLocationId=$(az customlocation show --resource-group $ArcResourceGroupName --name $CUSTOM_LOCATION_NAME --query id --output tsv) # Get info about the connected environment $myContainerApp="${imageName}-container-app" $myConnectedEnvironment=$(az containerapp connected-env list --custom-location $customLocationId -o tsv --query '[].id') # create acr and group az group create --name $ArcResourceGroupName --location eastus az acr create --resource-group $ArcResourceGroupName --name $ACRName --sku Basic # Wait for the ACR to be created Start-Sleep -Seconds 10 # login to acr and get login server az acr login --name $ACRName $ACRLoginServer = $(az acr show --name $ACRName --query loginServer --output tsv) # DEBUG: Test ACR login if ($Debug) { Write-Debug az acr show --name $ACRName Write-Debug az acr repository list --name $ACRName --output table } # Build and push docker image cd .\DemoApp docker build -t ${imageName} . docker tag ${imageName} ${ACRLoginServer}/${imageName}:latest docker push ${ACRLoginServer}/${imageName}:latest cd .. # Enable admin user in ACR and get password az acr update -n $ACRName --admin-enabled true $password = $(az acr credential show --name ${ACRName} --query passwords[0].value --output tsv) # Create container app az containerapp create ` --resource-group $myResourceGroup ` --name $myContainerApp ` --environment $myConnectedEnvironment ` --environment-type connected ` --registry-server ${ACRLoginServer} ` --registry-username ${ACRName} ` --registry-password $password ` --image "${ACRLoginServer}/${imageName}:latest" ` --target-port 80 ` --ingress 'external' ` # Open the container app in a browser az containerapp browse --resource-group $myResourceGroup --name $myContainerApp } catch { # Catch any error Write-Error "An error occurred" Write-Error $Error[0] } } CreateContainerAppOnArcEnabledAksEz -AKSClusterResourceGroupName "my-aks-cluster-group" ` -location "westus" ` -AKSName "my-aks-cluster"` -edgeZone "losangeles" ` -nodeCount 2 ` -vmSize "standard_nv12ads_a10_v5" ` -ArcResourceGroupName "myArcResourceGroup" ` -CONNECTED_ENVIRONMENT_NAME "myConnectedEnvironment" ` -CUSTOM_LOCATION_NAME "myCustomLocation" ` -SubscriptionId "<your subscription>"` -ACRName "containerappezacr" ` -imageName "myimage" ``` ## Clean up resources When no longer needed, delete **my-aks-cluster-group** resource group and all of the resources it contains using the [az group delete](/cli/azure/group#az-group-delete) command. ```powershell az group delete --name my-aks-cluster-group ``` ## Related content - [Create an Arc-enabled AKS cluster in an Extended Zone](/azure/extended-zones/arc-enabled-workloads-arc-enabled-aks-cluster) - [Deploy Arc-enabled workloads in an Extended Zone: PostgreSQL](/azure/extended-zones/arc-enabled-workloads-postgre-sql) - [Deploy Arc-enabled workloads in an Extended Zone: ManagedSQL](/azure/extended-zones/arc-enabled-workloads-managed-sql) - [Deploy an AKS cluster in an Extended Zone](deploy-aks-cluster.md) - [Deploy a storage account in an Extended Zone](create-storage-account.md) - [Frequently asked questions](faq.md)
Success! Branch created successfully. Create Pull Request on GitHub
Error: