Skip to content

Commit 11ec3a2

Browse files
Merge pull request #264202 from MGoedtel/deprecateAKSPodMI
Updated note about Pod-managed ID deprecation
2 parents cf7f924 + 0b72749 commit 11ec3a2

File tree

2 files changed

+11
-9
lines changed

2 files changed

+11
-9
lines changed

articles/aks/use-azure-ad-pod-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Microsoft Entra pod-managed identities use Kubernetes primitives to associate [m
1616
> Kubernetes native capabilities to federate with any external identity providers on behalf of the
1717
> application.
1818
>
19-
> The open source Microsoft Entra pod-managed identity (preview) in Azure Kubernetes Service has been deprecated as of 10/24/2022, and the project will be archived in Sept. 2023. For more information, see the [deprecation notice](https://github.com/Azure/aad-pod-identity#-announcement). The AKS Managed add-on begins deprecation in Sept. 2024.
19+
> The open source Microsoft Entra pod-managed identity (preview) in Azure Kubernetes Service was deprecated on 10/24/2022, and the project archived in Sept. 2023. For more information, see the [deprecation notice](https://github.com/Azure/aad-pod-identity#-announcement). The AKS Managed add-on was deprecated in Sept. 2024.
2020
>
2121
> To disable the AKS Managed add-on, use the following command: `az feature unregister --namespace "Microsoft.ContainerService" --name "EnablePodIdentityPreview"`.
2222

articles/aks/use-managed-identity.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.topic: article
55
ms.custom:
66
- devx-track-azurecli
77
- ignite-2023
8-
ms.date: 01/24/2024
8+
ms.date: 01/25/2024
99
---
1010

1111
# Use a managed identity in Azure Kubernetes Service (AKS)
@@ -14,8 +14,10 @@ Azure Kubernetes Service (AKS) clusters require an identity to access Azure reso
1414

1515
AKS doesn't automatically create a [service principal](kubernetes-service-principal.md), so you have to create one. Clusters that use a service principal eventually expire, and the service principal must be renewed to avoid impacting cluster authentication with the identity. Managing service principals adds complexity, so it's easier to use managed identities instead. The same permission requirements apply for both service principals and managed identities. Managed identities use certificate-based authentication. Each managed identity's credentials have an expiration of *90 days* and are rolled after *45 days*. AKS uses both system-assigned and user-assigned managed identity types, and these identities are immutable.
1616

17-
> [!NOTE]
18-
> If you're considering implementing [Microsoft Entra pod-managed identity][aad-pod-identity] on your AKS cluster, we recommend you first review the [Microsoft Entra Workload ID overview][workload-identity-overview]. This authentication method replaces Microsoft Entra pod-managed identity (preview) and is the recommended method.
17+
> [!IMPORTANT]
18+
> The open source [Microsoft Entra pod-managed identity][entra-id-pod-managed-identity] (preview) in Azure Kubernetes Service was deprecated on 10/24/2022, and the project archived in Sept. 2023. For more information, see the [deprecation notice](https://github.com/Azure/aad-pod-identity#-announcement). The AKS Managed add-on was deprecated in Sept. 2024.
19+
>
20+
> We recommend you first review [Microsoft Entra Workload ID][workload-identity-overview] overview. This authentication method replaces Microsoft Entra pod-managed identity (preview) and is the recommended method.
1921
2022
## Before you begin
2123

@@ -31,7 +33,7 @@ AKS doesn't automatically create a [service principal](kubernetes-service-princi
3133
* If the cluster has Microsoft Entra pod-managed identity (`aad-pod-identity`) enabled, Node-Managed Identity (NMI) pods modify the iptables of the nodes to intercept calls to the Azure Instance Metadata (IMDS) endpoint. This configuration means any request made to the Metadata endpoint is intercepted by NMI, even if the pod doesn't use `aad-pod-identity`. AzurePodIdentityException CRD can be configured to inform `aad-pod-identity` of any requests to the Metadata endpoint originating from a pod that matches labels defined in CRD should be proxied without any processing in NMI. The system pods with `kubernetes.azure.com/managedby: aks` label in *kube-system* namespace should be excluded in `aad-pod-identity` by configuring the AzurePodIdentityException CRD.
3234
* For more information, see [Disable Microsoft Entra ID-pod-identity for a specific pod or application](./use-azure-ad-pod-identity.md#clean-up).
3335
* To configure an exception, install the [mic-exception YAML](https://github.com/Azure/aad-pod-identity/blob/master/deploy/infra/mic-exception.yaml).
34-
* AKS doesn't support the use of a system-assigned managed identity if using a custom private DNS zone.
36+
* AKS doesn't support the use of a system-assigned managed identity when using a custom private DNS zone.
3537

3638
## Summary of managed identities
3739

@@ -61,7 +63,7 @@ AKS uses several managed identities for built-in services and add-ons.
6163
> AKS creates a user-assigned kubelet identity in the node resource group if you don't [specify your own kubelet managed identity][use-a-pre-created-kubelet-managed-identity].
6264
6365
> [!NOTE]
64-
> If your cluster is already using managed identity and the identity was changed, for example you update the cluster identity type from system-assigned to user-assigned, there will be a delay for control plane components to switch to the new identity. Control plane components keep using the old identity until its token expires. After the token is refreshed, they switch to the new identity. This process can take several hours.
66+
> If your cluster is already using managed identity and the identity was changed, for example you update the cluster identity type from system-assigned to user-assigned, there is a delay for control plane components to switch to the new identity. Control plane components keep using the old identity until its token expires. After the token is refreshed, they switch to the new identity. This process can take several hours.
6567
6668
1. Create an Azure resource group using the [`az group create`][az-group-create] command.
6769

@@ -209,7 +211,7 @@ A custom user-assigned managed identity for the control plane enables access to
209211
### Update managed identity on an existing cluster
210212
211213
> [!NOTE]
212-
> Migrating a managed identity for the control plane, from system-assigned to user-assigned, doesn't cause any downtime for control plane and agent pools. Meanwhile, control plane components will keep using the old system-assigned identity for several hours until the next token refresh.
214+
> Migrating a managed identity for the control plane, from system-assigned to user-assigned, doesn't cause any downtime for control plane and agent pools. Meanwhile, control plane components keep using the old system-assigned identity for several hours until the next token refresh.
213215
214216
* If you don't have a managed identity, create one using the [`az identity create`][az-identity-create] command.
215217
@@ -368,7 +370,7 @@ Now you can create your AKS cluster with your existing identities. Make sure to
368370
### Update an existing cluster using kubelet identity
369371
370372
> [!WARNING]
371-
> Updating kubelet managed identity upgrades node pools, which causes downtime for your AKS cluster as the nodes in the node pools will be cordoned/drained and reimaged.
373+
> Updating kubelet managed identity upgrades node pools, which causes downtime for your AKS cluster as the nodes in the node pools are cordoned/drained and reimaged.
372374
373375
> [!NOTE]
374376
> If your cluster was using `--attach-acr` to pull from images from Azure Container Registry, you need to run the `az aks update --resource-group myResourceGroup --name myAKSCluster --attach-acr <ACR Resource ID>` command after updating your cluster to let the newly-created kubelet used for managed identity get the permission to pull from ACR. Otherwise, you won't be able to pull from ACR after the upgrade.
@@ -473,6 +475,7 @@ Use [Azure Resource Manager templates][aks-arm-template] to create a managed ide
473475
474476
<!-- LINKS - external -->
475477
[aks-arm-template]: /azure/templates/microsoft.containerservice/managedclusters
478+
[entra-id-pod-managed-identity]: https://github.com/furkanyildiz/azure-docs/blob/feature/inform-deprecated-aks-identity/articles/aks/use-azure-ad-pod-identity.md
476479
477480
<!-- LINKS - internal -->
478481
[install-azure-cli]: /cli/azure/install-azure-cli
@@ -483,7 +486,6 @@ Use [Azure Resource Manager templates][aks-arm-template] to create a managed ide
483486
[use-a-pre-created-kubelet-managed-identity]: use-managed-identity.md#use-a-pre-created-kubelet-managed-identity
484487
[update-managed-identity-on-an-existing-cluster]: use-managed-identity.md#update-managed-identity-on-an-existing-cluster
485488
[workload-identity-overview]: workload-identity-overview.md
486-
[aad-pod-identity]: use-azure-ad-pod-identity.md
487489
[add-role-assignment-for-managed-identity]: use-managed-identity.md#add-role-assignment-for-managed-identity
488490
[az-group-create]: /cli/azure/group#az_group_create
489491
[az-aks-create]: /cli/azure/aks#az_aks_create

0 commit comments

Comments
 (0)