Skip to content

Commit 0a791da

Browse files
committed
remove default flag --enable-managed-identity for az aks create calls
1 parent d5968fe commit 0a791da

9 files changed

+34
-21
lines changed

articles/aks/configure-kubenet.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -254,14 +254,13 @@ You need to use the subnet ID for where you plan to deploy your AKS cluster. Thi
254254
az network vnet subnet list --resource-group myResourceGroup --vnet-name myAKSVnet [--subscription]
255255
```
256256
257-
2. Create an AKS cluster with a custom subnet pre-configured with a route table using the [`az aks create`][az-aks-create] command and providing your values for the `--vnet-subnet-id`, `--enable-managed-identity`, and `--assign-identity` parameters.
257+
2. Create an AKS cluster with a custom subnet pre-configured with a route table using the [`az aks create`][az-aks-create] command and providing your values for the `--vnet-subnet-id` and `--assign-identity` parameters.
258258
259259
```azurecli-interactive
260260
az aks create \
261261
--resource-group myResourceGroup \
262262
--name myManagedCluster \
263263
--vnet-subnet-id mySubnetIDResourceID \
264-
--enable-managed-identity \
265264
--assign-identity controlPlaneIdentityResourceID \
266265
--generate-ssh-keys
267266
```

articles/aks/cost-analysis.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,13 @@ You can enable the cost analysis with the `--enable-cost-analysis` flag during o
8383
The following example creates a new AKS cluster in the `Standard` tier with cost analysis enabled:
8484

8585
```azurecli-interactive
86-
az aks create --resource-group <resource-group> --name <cluster-name> --location <location> --enable-managed-identity --generate-ssh-keys --tier standard --enable-cost-analysis
86+
az aks create \
87+
--resource-group <resource-group> \
88+
--name <cluster-name> \
89+
--location <location> \
90+
--tier standard \
91+
--enable-cost-analysis \
92+
--generate-ssh-keys
8793
```
8894

8995
The following example updates an existing AKS cluster in the `Standard` tier to enable cost analysis:

articles/aks/csi-secrets-store-driver.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ A container using *subPath volume mount* doesn't receive secret updates when it'
4242
az group create --name myResourceGroup --location eastus2
4343
```
4444
45-
2. Create an AKS cluster with Azure Key Vault provider for Secrets Store CSI Driver capability using the [`az aks create`][az-aks-create] command with the --enable-managed-identity parameter and the `--enable-addons azure-keyvault-secrets-provider` parameter. The add-on creates a user-assigned managed identity you can use to authenticate to your key vault. The following example creates an AKS cluster with the Azure Key Vault provider for Secrets Store CSI Driver enabled.
45+
2. Create an AKS cluster with Azure Key Vault provider for Secrets Store CSI Driver capability using the [`az aks create`][az-aks-create] command with the `--enable-addons azure-keyvault-secrets-provider` parameter. The add-on creates a user-assigned managed identity you can use to authenticate to your key vault. The following example creates an AKS cluster with the Azure Key Vault provider for Secrets Store CSI Driver enabled.
4646
4747
> [!NOTE]
4848
> If you want to use Microsoft Entra Workload ID, you must also use the `--enable-oidc-issuer` and `--enable-workload-identity` parameters, such as in the following example:
@@ -52,7 +52,11 @@ A container using *subPath volume mount* doesn't receive secret updates when it'
5252
> ```
5353
5454
```azurecli-interactive
55-
az aks create --name myAKSCluster --resource-group myResourceGroup --enable-managed-identity --enable-addons azure-keyvault-secrets-provider --generate-ssh-keys
55+
az aks create \
56+
--name myAKSCluster \
57+
--resource-group myResourceGroup \
58+
--enable-addons azure-keyvault-secrets-provider \
59+
--generate-ssh-keys
5660
```
5761
5862
3. The previous command creates a user-assigned managed identity, `azureKeyvaultSecretsProvider`, to access Azure resources. The following example uses this identity to connect to the key vault that stores the secrets, but you can also use other [identity access methods][identity-access-methods]. Take note of the identity's `clientId` in the output.

articles/aks/howto-deploy-java-quarkus-app.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -273,8 +273,7 @@ az aks create \
273273
--name $CLUSTER_NAME \
274274
--attach-acr $REGISTRY_NAME \
275275
--node-count 1 \
276-
--generate-ssh-keys \
277-
--enable-managed-identity
276+
--generate-ssh-keys
278277
```
279278

280279
After a few minutes, the command completes and returns JSON-formatted information about the cluster, including the following output:

articles/aks/limit-egress-traffic.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -309,16 +309,18 @@ If you don't have user-assigned identities, follow the steps in this section. If
309309
310310
#### Create an AKS cluster with your existing identities
311311
312-
Create an AKS cluster with your existing identities in the subnet using the [`az aks create`][az-aks-create] command, provide the resource ID of the managed identity for the control plane by including the `assign-kubelet-identity` argument.
312+
Create an AKS cluster with your existing user-assigned managed identities in the subnet using the [`az aks create`][az-aks-create] command. Provide the resource ID of the managed identity for the control plane and the resource ID of the kubelet identity.
313313
314314
```azurecli-interactive
315-
az aks create --resource-group $RG --name $AKSNAME --location $LOC \
315+
az aks create \
316+
--resource-group $RG \
317+
--name $AKSNAME \
318+
--location $LOC \
316319
--node-count 3 \
317320
--network-plugin kubenet \
318321
--outbound-type userDefinedRouting \
319322
--vnet-subnet-id $SUBNETID \
320323
--api-server-authorized-ip-ranges $FWPUBLIC_IP
321-
--enable-managed-identity \
322324
--assign-identity <identity-resource-id> \
323325
--assign-kubelet-identity <kubelet-identity-resource-id> \
324326
--generate-ssh-keys

articles/aks/manage-node-pools.md

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -269,12 +269,16 @@ As your workload demands change, you can associate existing capacity reservation
269269

270270
* You can also assign the user-managed identity on an existing managed cluster with update command.
271271

272-
```azurecli-interactive
273-
az aks update --resource-group $RG_NAME --name $CLUSTER_NAME --location $LOCATION \
274-
--node-vm-size $VM_SKU --node-count $NODE_COUNT \
275-
--assign-identity $IDENTITY_ID --enable-managed-identity
276-
```
277-
272+
```azurecli-interactive
273+
az aks update \
274+
--resource-group $RG_NAME \
275+
--name $CLUSTER_NAME \
276+
--location $LOCATION \
277+
--node-vm-size $VM_SKU \
278+
--node-count $NODE_COUNT \
279+
--assign-identity $IDENTITY_ID
280+
```
281+
278282
### Associate an existing capacity reservation group with a node pool
279283
280284
Associate an existing capacity reservation group with a node pool using the [`az aks nodepool add`][az-aks-nodepool-add] command and specify a capacity reservation group with the `--crg-id` flag. The following example assumes you have a CRG named "myCRG".

articles/aks/monitor-control-plane-metrics.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -63,15 +63,15 @@ az provider register --namespace "Microsoft.ContainerService"
6363

6464
## Enable control plane metrics on your AKS cluster
6565

66-
You can enable control plane metrics with the Azure Monitor managed service for Prometheus add-on during cluster creation or for an existing cluster. To collect Prometheus metrics from your Kubernetes cluster, see [Enable Prometheus and Grafana for Kubernetes clusters][enable-monitoring-kubernetes-cluster] and follow the steps on the **CLI** tab for an AKS cluster. On the command-line, be sure to include the parameters `--generate-ssh-keys` and `--enable-managed-identity`.
66+
You can enable control plane metrics with the Azure Monitor managed service for Prometheus add-on during cluster creation or for an existing cluster. To collect Prometheus metrics from your Kubernetes cluster, see [Enable Prometheus and Grafana for Kubernetes clusters][enable-monitoring-kubernetes-cluster] and follow the steps on the **CLI** tab for an AKS cluster.
6767

6868
If your cluster already has the Prometheus addon deployed, then you can simply run an `az aks update` to ensure the cluster updates to start collecting control plane metrics.
6969

7070
```azurecli
71-
az aks update -n <cluster-name> -g <resource-group>
71+
az aks update --name <cluster-name> --resource-group <resource-group>
7272
```
7373

74-
>[!NOTE]
74+
> [!NOTE]
7575
> Unlike the metrics collected from cluster nodes, control plane metrics are collected by a component which isn't part of the **ama-metrics** add-on. Enabling the `AzureMonitorMetricsControlPlanePreview` feature flag and the managed prometheus add-on ensures control plane metrics are collected. After enabling metric collection, it can take several minutes for the data to appear in the workspace.
7676
7777
## Querying control plane metrics

articles/aks/operator-best-practices-cluster-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ For more information about Microsoft Entra integration, Kubernetes RBAC, and Azu
5555
5656
> [!NOTE]
5757
> To implement Network Policy, include the attribute `--network-policy azure` when creating the AKS cluster. Use the following command to create the cluster:
58-
> `az aks create -g myResourceGroup -n myManagedCluster --enable-managed-identity --network-plugin azure --network-policy azure --generate-ssh-keys`
58+
> `az aks create -g myResourceGroup -n myManagedCluster --network-plugin azure --network-policy azure --generate-ssh-keys`
5959
6060
```yaml
6161
apiVersion: networking.k8s.io/v1

articles/aks/use-group-managed-service-accounts.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,6 @@ You can either [grant access to your key vault for the identity after cluster cr
9191
9292
2. Create an AKS cluster using the [`az aks create`][az-aks-create] command with the following parameters:
9393
94-
* `--enable-managed-identity`: Enables managed identity for the cluster.
9594
* `--enable-windows-gmsa`: Enables GMSA for the cluster.
9695
* `--gmsa-dns-server`: The IP address of the DNS server.
9796
* `--gmsa-root-domain-name`: The root domain name of the DNS server.

0 commit comments

Comments
 (0)