Skip to content

Commit 1775ac5

Browse files
committed
revisions
1 parent 95e966b commit 1775ac5

File tree

1 file changed

+17
-16
lines changed

1 file changed

+17
-16
lines changed

articles/azure-arc/kubernetes/cluster-connect.md

Lines changed: 17 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -20,19 +20,10 @@ Before you begin, review the [conceptual overview of the cluster connect feature
2020
## Prerequisites
2121

2222
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
23+
2324
- An existing Azure Arc-enabled Kubernetes connected cluster.
2425
- If you haven't connected a cluster yet, use our [quickstart](quickstart-connect-cluster.md).
2526
- [Upgrade your agents](agent-upgrade.md#manually-upgrade-agents) to the latest version.
26-
- In addition to meeting the [network requirements for Arc-enabled Kubernetes](network-requirements.md), enable these endpoints for outbound access:
27-
28-
| Endpoint | Port |
29-
|----------------|-------|
30-
|`*.servicebus.windows.net` | 443 |
31-
|`guestnotificationservice.azure.com`, `*.guestnotificationservice.azure.com` | 443 |
32-
33-
> [!NOTE]
34-
> To translate the `*.servicebus.windows.net` wildcard into specific endpoints, use the command `\GET https://guestnotificationservice.azure.com/urls/allowlist?api-version=2020-01-01&location=<location>`. Within this command, the region must be specified for the `<location>` placeholder.
35-
3627

3728
### [Azure CLI](#tab/azure-cli)
3829

@@ -73,6 +64,16 @@ Before you begin, review the [conceptual overview of the cluster connect feature
7364

7465
---
7566

67+
- In addition to meeting the [network requirements for Arc-enabled Kubernetes](network-requirements.md), enable these endpoints for outbound access:
68+
69+
| Endpoint | Port |
70+
|----------------|-------|
71+
|`*.servicebus.windows.net` | 443 |
72+
|`guestnotificationservice.azure.com`, `*.guestnotificationservice.azure.com` | 443 |
73+
74+
> [!NOTE]
75+
> To translate the `*.servicebus.windows.net` wildcard into specific endpoints, use the command `\GET https://guestnotificationservice.azure.com/urls/allowlist?api-version=2020-01-01&location=<location>`. Within this command, the region must be specified for the `<location>` placeholder.
76+
7677
[!INCLUDE [arc-region-note](../includes/arc-region-note.md)]
7778

7879
## Set up authentication
@@ -101,13 +102,13 @@ On the existing Arc-enabled cluster, create the ClusterRoleBinding with either M
101102
102103
1. Authorize the entity with appropriate permissions.
103104
104-
- If you are using Kubernetes native ClusterRoleBinding or RoleBinding for authorization checks on the cluster, with the `kubeconfig` file pointing to the `apiserver` of your cluster for direct access, you can create one mapped to the Microsoft Entra entity (service principal or user) that needs to access this cluster. For example:
105+
- If you're using Kubernetes native ClusterRoleBinding or RoleBinding for authorization checks on the cluster, with the `kubeconfig` file pointing to the `apiserver` of your cluster for direct access, you can create one mapped to the Microsoft Entra entity (service principal or user) that needs to access this cluster. For example:
105106
106107
```console
107108
kubectl create clusterrolebinding demo-user-binding --clusterrole cluster-admin --user=$AAD_ENTITY_OBJECT_ID
108109
```
109110
110-
- If you are using Azure RBAC for authorization checks on the cluster, you can create an applicable [Azure role assignment](azure-rbac.md#built-in-roles) mapped to the Microsoft Entra entity. For example:
111+
- If you're using Azure RBAC for authorization checks on the cluster, you can create an applicable [Azure role assignment](azure-rbac.md#built-in-roles) mapped to the Microsoft Entra entity. For example:
111112
112113
```azurecli
113114
az role assignment create --role "Azure Arc Kubernetes Viewer" --assignee $AAD_ENTITY_OBJECT_ID --scope $ARM_ID_CLUSTER
@@ -132,13 +133,13 @@ On the existing Arc-enabled cluster, create the ClusterRoleBinding with either M
132133
133134
1. Authorize the entity with appropriate permissions.
134135
135-
- If you are using Kubernetes native ClusterRoleBinding or RoleBinding for authorization checks on the cluster, with the `kubeconfig` file pointing to the `apiserver` of your cluster for direct access, you can create one mapped to the Microsoft Entra entity (service principal or user) that needs to access this cluster. For example:
136+
- If you're using Kubernetes native ClusterRoleBinding or RoleBinding for authorization checks on the cluster, with the `kubeconfig` file pointing to the `apiserver` of your cluster for direct access, you can create one mapped to the Microsoft Entra entity (service principal or user) that needs to access this cluster. For example:
136137
137138
```console
138139
kubectl create clusterrolebinding demo-user-binding --clusterrole cluster-admin --user=$AAD_ENTITY_OBJECT_ID
139140
```
140141
141-
- If you are using [Azure RBAC for authorization checks](azure-rbac.md) on the cluster,you can create an applicable [Azure role assignment](azure-rbac.md#built-in-roles) mapped to the Microsoft Entra entity. For example:
142+
- If you're using [Azure RBAC for authorization checks](azure-rbac.md) on the cluster, you can create an applicable [Azure role assignment](azure-rbac.md#built-in-roles) mapped to the Microsoft Entra entity. For example:
142143
143144
```azurepowershell
144145
@@ -263,7 +264,7 @@ Use `az connectedk8s show` to check your Arc-enabled Kubernetes agent version.
263264

264265
### [Agent version < 1.11.7](#tab/agent-version)
265266

266-
When making requests to the Kubernetes cluster, if the Microsoft Entra entity used is a part of more than 200 groups, you may see the following error:
267+
When making requests to the Kubernetes cluster, if the Microsoft Entra entity used is a part of more than 200 groups, you might see the following error:
267268

268269
`You must be logged in to the server (Error:Error while retrieving group info. Error:Overage claim (users with more than 200 group membership) is currently not supported.`
269270

@@ -274,7 +275,7 @@ This is a known limitation. To get past this error:
274275

275276
### [Agent version >= 1.11.7](#tab/agent-version-latest)
276277

277-
When making requests to the Kubernetes cluster, if the Microsoft Entra service principal used is a part of more than 200 groups, you may see the following error:
278+
When making requests to the Kubernetes cluster, if the Microsoft Entra service principal used is a part of more than 200 groups, you might see the following error:
278279

279280
`Overage claim (users with more than 200 group membership) for SPN is currently not supported. For troubleshooting, please refer to aka.ms/overageclaimtroubleshoot`
280281

0 commit comments

Comments
 (0)