You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/limit-egress-traffic.md
+73Lines changed: 73 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -458,6 +458,13 @@ You'll define the outbound type to use the UDR that already exists on the subnet
458
458
>
459
459
> The AKS feature for [**API server authorized IP ranges**](api-server-authorized-ip-ranges.md) can be added to limit API server access to only the firewall's public endpoint. The authorized IP ranges feature is denoted in the diagram as optional. When enabling the authorized IP range feature to limit API server access, your developer tools must use a jumpbox from the firewall's virtual network or you must add all developer endpoints to the authorized IP range.
460
460
461
+
#### Create an AKS cluster with system-assigned identities
462
+
463
+
> [!NOTE]
464
+
> AKS will create a system-assigned kubelet identity in the Node resource group if you do not [specify your own kubelet managed identity][Use a pre-created kubelet managed identity].
465
+
466
+
You can create an AKS cluster using a system-assigned managed identity by running the following CLI command.
467
+
461
468
```azurecli
462
469
az aks create -g $RG -n $AKSNAME -l $LOC \
463
470
--node-count 3 \
@@ -472,6 +479,71 @@ az aks create -g $RG -n $AKSNAME -l $LOC \
472
479
>
473
480
> If you are not using the CLI but using your own VNet or route table which are outside of the worker node resource group, it's recommended to use [user-assigned control plane identity][Bring your own control plane managed identity]. For system-assigned control plane identity, we cannot get the identity ID before creating cluster, which causes delay for role assignment to take effect.
474
481
482
+
#### Create an AKS cluster with user-assigned identities
483
+
484
+
##### Create user-assigned managed identities
485
+
486
+
If you don't have a control plane managed identity, you can create by running the following [az identity create][az-identity-create] command:
487
+
488
+
```azurecli-interactive
489
+
az identity create --name myIdentity --resource-group myResourceGroup
##### Create an AKS cluster with user-assigned identities
533
+
534
+
Now you can use the following command to create your AKS cluster with your existing identities in the subnet. Provide the control plane identity resource ID via `assign-identity` and the kubelet managed identity via `assign-kubelet-identity`:
0 commit comments