Skip to content

Commit 1ebe4bd

Browse files
committed
add note about required permissions on the API server subnet
1 parent e8caf13 commit 1ebe4bd

File tree

1 file changed

+7
-0
lines changed

1 file changed

+7
-0
lines changed

articles/aks/api-server-vnet-integration.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -97,6 +97,8 @@ Where `--enable-private-cluster` is a mandatory flag for a private cluster, and
9797

9898
When using bring-your-own VNet, an API server subnet must be created and delegated to `Microsoft.ContainerService/managedClusters`. This grants the AKS service permissions to inject the API server pods and internal load balancer into that subnet. The subnet may not be used for any other workloads, but may be used for multiple AKS clusters located in the same virtual network. An AKS cluster will require from 2-7 IP addresses depending on cluster scale. The minimum supported API server subnet size is a /28.
9999

100+
Note that the cluster identity needs permissions to both the API server subnet and the node subnet. Lack of permissions at the API server subnet will cause a provisioning failure.
101+
100102
> [!WARNING]
101103
> Running out of IP addresses may prevent API server scaling and cause an API server outage.
102104
@@ -134,6 +136,11 @@ az network vnet subnet create --vnet-name <vnet-name> \
134136
# Create the identity
135137
az identity create -n <managed-identity-name> -l <location>
136138
139+
# Assign Network Contributor to the API server subnet
140+
az role assignment create --scope <apiserver-subnet-resource-id> \
141+
--role "Network Contributor" \
142+
--assignee <managed-identity-client-id>
143+
137144
# Assign Network Contributor to the cluster subnet
138145
az role assignment create --scope <cluster-subnet-resource-id> \
139146
--role "Network Contributor" \

0 commit comments

Comments
 (0)