Skip to content

Commit 1d6e829

Browse files
Merge pull request #244669 from aramase/patch-1
update WI migration doc
2 parents 8411261 + f2bf3a1 commit 1d6e829

File tree

1 file changed

+7
-5
lines changed

1 file changed

+7
-5
lines changed

articles/aks/workload-identity-migrate-from-pod-identity.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ If your cluster is already using the latest version of the Azure Identity SDK, p
3737

3838
If your cluster isn't using the latest version of the Azure Identity SDK, you have two options:
3939

40-
- You can use a migration sidecar that we provide within your applications, which proxies the IMDS transactions your application makes over to [OpenID Connect][openid-connect-overview] (OIDC). The migration sidecar isn't intended to be a long-term solution, but a way to get up and running quickly on workload identity. Perform the following steps to:
40+
- You can use a migration sidecar that we provide within your Linux applications, which proxies the IMDS transactions your application makes over to [OpenID Connect][openid-connect-overview] (OIDC). The migration sidecar isn't intended to be a long-term solution, but a way to get up and running quickly on workload identity. Perform the following steps to:
4141

4242
- [Deploy the workload with migration sidecar](#deploy-the-workload-with-migration-sidecar) to proxy the application IMDS transactions.
4343
- Verify the authentication transactions are completing successfully.
@@ -46,6 +46,7 @@ If your cluster isn't using the latest version of the Azure Identity SDK, you ha
4646

4747
> [!NOTE]
4848
> The migration sidecar is **not supported for production use**. This feature is meant to give you time to migrate your application SDK's to a supported version, and not meant or intended to be a long-term solution.
49+
> The migration sidecar is only for Linux containers as pod-managed identities was available on Linux node pools only.
4950
5051
- Rewrite your application to support the latest version of the [Azure Identity][azure-identity-supported-versions] client library. Afterwards, perform the following steps:
5152

@@ -103,8 +104,6 @@ kind: ServiceAccount
103104
metadata:
104105
annotations:
105106
azure.workload.identity/client-id: ${USER_ASSIGNED_CLIENT_ID}
106-
labels:
107-
azure.workload.identity/use: "true"
108107
name: ${SERVICE_ACCOUNT_NAME}
109108
namespace: ${SERVICE_ACCOUNT_NAMESPACE}
110109
EOF
@@ -131,6 +130,7 @@ az identity federated-credential create --name federatedIdentityName --identity-
131130

132131
> [!NOTE]
133132
> The migration sidecar is **not supported for production use**. This feature is meant to give you time to migrate your application SDK's to a supported version, and not meant or intended to be a long-term solution.
133+
> The migration sidecar is only for Linux containers as pod-managed identities was available on Linux node pools only.
134134
135135
If your application is using managed identity and still relies on IMDS to get an access token, you can use the workload identity migration sidecar to start migrating to workload identity. This sidecar is a migration solution and in the long-term applications, you should modify their code to use the latest Azure Identity SDKs that support client assertion.
136136

@@ -151,11 +151,13 @@ metadata:
151151
labels:
152152
app: httpbin
153153
azure.workload.identity/use: "true"
154+
annotations:
155+
azure.workload.identity/inject-proxy-sidecar: "true"
154156
spec:
155157
serviceAccountName: workload-identity-sa
156158
initContainers:
157159
- name: init-networking
158-
image: mcr.microsoft.com/oss/azure/workload-identity/proxy-init:v0.13.0
160+
image: mcr.microsoft.com/oss/azure/workload-identity/proxy-init:v1.1.0
159161
securityContext:
160162
capabilities:
161163
add:
@@ -173,7 +175,7 @@ spec:
173175
ports:
174176
- containerPort: 80
175177
- name: proxy
176-
image: mcr.microsoft.com/oss/azure/workload-identity/proxy:v0.13.0
178+
image: mcr.microsoft.com/oss/azure/workload-identity/proxy:v1.1.0
177179
ports:
178180
- containerPort: 8000
179181
```

0 commit comments

Comments
 (0)