Skip to content

Commit 10fe3ce

Browse files
committed
update commands
1 parent f953bf9 commit 10fe3ce

File tree

1 file changed

+8
-4
lines changed

1 file changed

+8
-4
lines changed

articles/azure-arc/kubernetes/azure-rbac.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: "Azure RBAC for Azure Arc-enabled Kubernetes clusters"
3-
ms.date: 11/28/2022
3+
ms.date: 03/13/2023
44
ms.topic: how-to
55
ms.custom: devx-track-azurecli
66
description: "Use Azure RBAC for authorization checks on Azure Arc-enabled Kubernetes clusters."
@@ -262,8 +262,8 @@ az connectedk8s enable-features -n <clusterName> -g <resourceGroupName> --featur
262262

263263
```console
264264
sudo mkdir -p /etc/guard
265-
kubectl get secrets azure-arc-guard-manifests -n kube-system -o json | jq '.data."guard-authn-webhook.yaml"' | base64 -d > /etc/guard/guard-authn-webhook.yaml
266-
kubectl get secrets azure-arc-guard-manifests -n kube-system -o json | jq '.data."guard-authz-webhook.yaml"' | base64 -d > /etc/guard/guard-authz-webhook.yaml
265+
kubectl get secrets azure-arc-guard-manifests -n kube-system -o json | jq -r '.data."guard-authn-webhook.yaml"' | base64 -d > /etc/guard/guard-authn-webhook.yaml
266+
kubectl get secrets azure-arc-guard-manifests -n kube-system -o json | jq -r '.data."guard-authz-webhook.yaml"' | base64 -d > /etc/guard/guard-authz-webhook.yaml
267267
```
268268

269269
1. Open the `apiserver` manifest in edit mode:
@@ -492,7 +492,11 @@ After the proxy process is running, you can open another tab in your console to
492492
--auth-provider-arg=apiserver-id=<serverApplicationId>
493493
```
494494

495-
1. Open the *kubeconfig* file that you created earlier. Under `contexts`, verify that the context associated with the cluster points to the user credentials that you created in the previous step.
495+
1. Open the *kubeconfig* file that you created earlier. Under `contexts`, verify that the context associated with the cluster points to the user credentials that you created in the previous step. To set the current context to these user credentials, run the following command:
496+
497+
```console
498+
kubectl config set-context --current=true --user=<testuser>@<mytenant.onmicrosoft.com>
499+
```
496500

497501
1. Add the **config-mode** setting under `user` > `config`:
498502

0 commit comments

Comments
 (0)