You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -227,7 +227,7 @@ You'll define the outbound type to use the UDR that already exists on the subnet
227
227
>
228
228
> You can add the AKS feature for [**API server authorized IP ranges**](api-server-authorized-ip-ranges.md) to limit API server access to only the firewall's public endpoint. The authorized IP ranges feature is denoted in the diagram as optional. When enabling the authorized IP range feature to limit API server access, your developer tools must use a jumpbox from the firewall's virtual network, or you must add all developer endpoints to the authorized IP range.
229
229
230
-
### Create an AKS cluster with system-assigned identities
230
+
### [Create an AKS cluster with system-assigned identities](#tab/aks-with-system-assigned-identities)
231
231
232
232
> [!NOTE]
233
233
> AKS will create a system-assigned kubelet identity in the node resource group if you don't [specify your own kubelet managed identity][Use a pre-created kubelet managed identity].
@@ -245,14 +245,16 @@ az aks create -g $RG -n $AKSNAME -l $LOC \
245
245
--api-server-authorized-ip-ranges $FWPUBLIC_IP
246
246
```
247
247
248
-
### Create user-assigned identities
248
+
### [Create an AKS cluster with user-assigned identities](#tab/aks-with-user-assigned-identities)
249
249
250
-
If you don't have user-assigned identities, follow the steps in this section. If you already have user-assigned identities, skip to [Create an AKS cluster with user-assigned identities](#create-an-aks-cluster-with-user-assigned-identities).
250
+
#### Create user-assigned identities
251
+
252
+
If you don't have user-assigned identities, follow the steps in this section. If you already have user-assigned identities, skip to [Create an AKS cluster with user-assigned identities](#create-an-aks-cluster-with-your-existing-identities).
251
253
252
254
1. Create a managed identity using the [`az identity create`][az-identity-create] command.
253
255
254
256
```azurecli-interactive
255
-
az identity create --name myIdentity --resource-group myResourceGroup
257
+
az identity create --name myIdentity --resource-group $RG
256
258
```
257
259
258
260
The output should resemble the following example output:
@@ -261,11 +263,11 @@ If you don't have user-assigned identities, follow the steps in this section. If
@@ -298,7 +300,7 @@ If you don't have user-assigned identities, follow the steps in this section. If
298
300
> [!NOTE]
299
301
> If you create your own VNet and route table where the resources are outside of the worker node resource group, the CLI will add the role assignment automatically. If you're using an ARM template or other method, you need to use the Principal ID of the cluster managed identity to perform a [role assignment][add role to identity].
300
302
301
-
### Create an AKS cluster with user-assigned identities
303
+
####Create an AKS cluster with your existing identities
302
304
303
305
Create an AKS cluster with your existing identities in the subnet using the [`az aks create`][az-aks-create] command, provide the resource ID of the managed identity for the control plane by including the `assign-kubelet-identity` argument.
304
306
@@ -342,225 +344,12 @@ You can now start exposing services and deploying applications to this cluster.
342
344
343
345

344
346
345
-
1. Copy the following YAML and save it as a file named `example.yaml`.
1. Review the [AKS Store Demo quickstart](https://github.com/Azure-Samples/aks-store-demo/blob/main/aks-store-quickstart.yaml) manifest to see all the resources that will be created.
559
348
560
349
2. Deploy the service using the `kubectl apply` command.
2. Get the service IP using the `kubectl get svc voting-app` command.
@@ -603,11 +393,13 @@ To configure inbound connectivity, you need to write a DNAT rule to the Azure Fi
603
393
604
394
Navigate to the Azure Firewall frontend IP address in a browser to validate connectivity.
605
395
606
-
You should see the AKS voting app. In this example, the firewall public IP was `52.253.228.132`.
396
+
You should see the AKS store app. In this example, the firewall public IP was `52.253.228.132`.
397
+
398
+
:::image type="content" source="./media/container-service-kubernetes-tutorials/aks-store-application.png" alt-text="Screenshot showing the Azure Store Front App opened in a local browser." lightbox="./media/container-service-kubernetes-tutorials/aks-store-application.png":::
607
399
608
-

400
+
On this page, you can view products, add them to your cart, and then place an order.
609
401
610
-
### Clean up resources
402
+
## Clean up resources
611
403
612
404
To clean up Azure resources, delete the AKS resource group using the [`az group delete`][az-group-delete] command.
0 commit comments