You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/workload-identity-deploy-cluster.md
+75-25Lines changed: 75 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,16 +66,16 @@ az aks update -g "${RESOURCE_GROUP}" -n myAKSCluster --enable-oidc-issuer --enab
66
66
To get the OIDC Issuer URL and save it to an environmental variable, run the following command. Replace the default value for the arguments `-n`, which is the name of the cluster:
67
67
68
68
```bash
69
-
export AKS_OIDC_ISSUER="$(az aks show -n myAKSCluster -g "${RESOURCE_GROUP}" --query "oidcIssuerProfile.issuerUrl" -otsv)"
69
+
export AKS_OIDC_ISSUER="$(az aks show -n myAKSCluster -g "${RESOURCE_GROUP}" --query "oidcIssuerProfile.issuerUrl" -o tsv)"
70
70
```
71
71
72
72
The variable should contain the Issuer URL similar to the following example:
By default, the Issuer is set to use the base URL `https://{region}.oic.prod-aks.azure.com/{uuid}`, where the value for `{region}` matches the location the AKS cluster is deployed in. The value `{uuid}` represents the OIDC key.
78
+
By default, the Issuer is set to use the base URL `https://{region}.oic.prod-aks.azure.com/{tenant_id}/{uuid}`, where the value for `{region}` matches the location the AKS cluster is deployed in. The value `{uuid}` represents the OIDC key.
> Ensure your application pods using workload identity have added the following label `azure.workload.identity/use: "true"` to your pod spec, otherwise the pods fail after their restarted.
153
156
154
-
```bash
155
-
kubectl apply -f <your application>
156
-
```
157
-
158
-
To check whether all properties are injected properly by the webhook, use the [kubectl describe][kubectl-describe] command:
159
-
160
-
```bash
161
-
kubectl describe pod containerName
162
-
```
163
-
164
-
To verify that pod is able to get a token and access the resource, use the kubectl logs command:
165
-
166
-
```bash
167
-
kubectl logs containerName
168
-
```
169
157
170
158
## Optional - Grant permissions to access Azure Key Vault
171
159
@@ -181,20 +169,82 @@ You can retrieve this information using the Azure CLI command: [az keyvault list
181
169
1. Set an access policy for the managed identity to access secrets in your Key Vault by running the following commands:
0 commit comments