Skip to content

Commit 28ec335

Browse files
committed
Resolving build errors
1 parent 64fa04e commit 28ec335

9 files changed

+15
-106
lines changed

articles/aks/access-control-managed-aad.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -131,6 +131,10 @@ Error from server (Forbidden): nodes is forbidden: User "aaaa11111-11aa-aa11-a1a
131131

132132
Make sure the admin of the security group has given your account an *Active* assignment.
133133

134+
## Next steps
135+
136+
* Use [kubelogin](https://github.com/Azure/kubelogin) to access features for Azure authentication that aren't available in kubectl.
137+
134138
<!-- LINKS - External -->
135139
[aad-pricing]: https://azure.microsoft.com/pricing/details/active-directory/
136140

articles/aks/azure-ad-integration-cli.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.author: miwithro
1313
> [!WARNING]
1414
> **The feature described in this document, Azure AD Integration (legacy), will be deprecated on June 1st, 2023.
1515
>
16-
> AKS has a new improved [AKS-managed Azure AD][managed-aad] experience that doesn't require you to manage server or client application. If you want to migrate follow the instructions [here][managed-aad-migrate].
16+
> AKS has a new improved [AKS-managed Azure AD][managed-aad] experience that doesn't require you to manage server or client applications. If you want to migrate follow the instructions [here][managed-aad-migrate].
1717
1818
Azure Kubernetes Service (AKS) can be configured to use Azure Active Directory (AD) for user authentication. In this configuration, you can log into an AKS cluster using an Azure AD authentication token. Cluster operators can also configure Kubernetes role-based access control (Kubernetes RBAC) based on a user's identity or directory group membership.
1919

@@ -283,4 +283,4 @@ For best practices on identity and resource control, see [Best practices for aut
283283
[operator-best-practices-identity]: operator-best-practices-identity.md
284284
[azure-ad-rbac]: azure-ad-rbac.md
285285
[managed-aad]: managed-aad.md
286-
[managed-aad-migrate]: managed-aad.md#upgrade-to-aks-managed-azure-ad-integration
286+
[managed-aad-migrate]: managed-aad.md#upgrade-a-legacy-azure-ad-cluster-to-aks-managed-azure-ad-integration

articles/aks/azure-ad-rbac.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -471,4 +471,4 @@ az ad group delete --group opssre
471471
[rbac-authorization]: concepts-identity.md#kubernetes-rbac
472472
[operator-best-practices-identity]: operator-best-practices-identity.md
473473
[terraform-on-azure]: /azure/developer/terraform/overview
474-
[enable-azure-ad-integration-existing-cluster]: managed-aad.md#enable-aks-managed-azure-ad-integration-on-your-existing-cluster
474+
[enable-azure-ad-integration-existing-cluster]: managed-aad.md#use-an-existing-cluster

articles/aks/kubernetes-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,5 +120,5 @@ This article showed you how to access Kubernetes resources from the Azure portal
120120
[aks-quickstart-portal]: ./learn/quick-kubernetes-deploy-portal.md
121121
[deployments]: concepts-clusters-workloads.md#deployments-and-yaml-manifests
122122
[aks-managed-aad]: managed-aad.md
123-
[cli-aad-upgrade]: managed-aad.md#upgrade-to-aks-managed-azure-ad-integration
123+
[cli-aad-upgrade]: managed-aad.md#upgrade-a-legacy-azure-ad-cluster-to-aks-managed-azure-ad-integration
124124
[enable-monitor]: ../azure-monitor/containers/container-insights-enable-existing-clusters.md

articles/aks/manage-local-accounts-managed-aad.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,12 @@ When you deploy an AKS cluster, local accounts are enabled by default. Even when
108108
Merged "<cluster-name>-admin" as current context in C:\Users\<username>\.kube\config
109109
```
110110
111+
## Next steps
112+
113+
* Learn about [Azure RBAC integration for Kubernetes Authorization][azure-rbac-integration].
114+
111115
<!-- LINKS - Internal -->
112116
[az-aks-create]: /cli/azure/aks#az_aks_create
113117
[az-aks-update]: /cli/azure/aks#az_aks_update
114118
[az-aks-get-credentials]: /cli/azure/aks#az_aks_get_credentials
119+
[azure-rbac-integration]: manage-azure-rbac.md

articles/aks/managed-aad.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -149,17 +149,14 @@ If you're permanently blocked by not having access to a valid Azure AD group wit
149149
150150
## Next steps
151151
152-
* Learn about [Azure RBAC integration for Kubernetes Authorization][azure-rbac-integration].
153152
* Learn about [Azure AD integration with Kubernetes RBAC][azure-ad-rbac].
154-
* Use [kubelogin](https://github.com/Azure/kubelogin) to access features for Azure authentication that aren't available in kubectl.
155153
* Learn more about [AKS and Kubernetes identity concepts][aks-concepts-identity].
156154
* Use [Azure Resource Manager (ARM) templates][aks-arm-template] to create AKS-managed Azure AD enabled clusters.
157155
158156
<!-- LINKS - external -->
159157
[aks-arm-template]: /azure/templates/microsoft.containerservice/managedclusters
160158
161159
<!-- LINKS - Internal -->
162-
[azure-rbac-integration]: manage-azure-rbac.md
163160
[aks-concepts-identity]: concepts-identity.md
164161
[azure-ad-rbac]: azure-ad-rbac.md
165162
[az-aks-create]: /cli/azure/aks#az_aks_create

articles/aks/managed-local-accounts-managed-aad.md

Lines changed: 0 additions & 97 deletions
This file was deleted.

articles/aks/trusted-access-feature.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ This article shows you how to enable secure access from your Azure services to y
2828

2929
## Trusted Access feature overview
3030

31-
Trusted Access enables you to give explicit consent to your system-assigned MSI of allowed resources to access your AKS clusters using an Azure resource *RoleBinding*. Your Azure resources access AKS clusters through the AKS regional gateway via system-assigned managed identity authentication with the appropriate Kubernetes permissions via an Azure resource *Role*. The Trusted Access feature allows you to access AKS clusters with different configurations, including but not limited to [private clusters](private-clusters.md), [clusters with local accounts disabled](managed-aad.md#disable-local-accounts), [Azure AD clusters](azure-ad-integration-cli.md), and [authorized IP range clusters](api-server-authorized-ip-ranges.md).
31+
Trusted Access enables you to give explicit consent to your system-assigned MSI of allowed resources to access your AKS clusters using an Azure resource *RoleBinding*. Your Azure resources access AKS clusters through the AKS regional gateway via system-assigned managed identity authentication with the appropriate Kubernetes permissions via an Azure resource *Role*. The Trusted Access feature allows you to access AKS clusters with different configurations, including but not limited to [private clusters](private-clusters.md), [clusters with local accounts disabled](manage-local-accounts-managed-aad.md#disable-local-accounts), [Azure AD clusters](azure-ad-integration-cli.md), and [authorized IP range clusters](api-server-authorized-ip-ranges.md).
3232

3333
## Prerequisites
3434

articles/machine-learning/how-to-deploy-kubernetes-extension.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ In this article, you can learn:
4141

4242
- [Using a service principal with AKS](../aks/kubernetes-service-principal.md) is **not supported** by Azure Machine Learning. The AKS cluster must use a **managed identity** instead. Both **system-assigned managed identity** and **user-assigned managed identity** are supported. For more information, see [Use a managed identity in Azure Kubernetes Service](../aks/use-managed-identity.md).
4343
- When your AKS cluster used service principal is converted to use Managed Identity, before installing the extension, all node pools need to be deleted and recreated, rather than updated directly.
44-
- [Disabling local accounts](../aks/managed-aad.md#disable-local-accounts) for AKS is **not supported** by Azure Machine Learning. When the AKS Cluster is deployed, local accounts are enabled by default.
44+
- [Disabling local accounts](../aks/manage-local-accounts-managed-aad.md#disable-local-accounts) for AKS is **not supported** by Azure Machine Learning. When the AKS Cluster is deployed, local accounts are enabled by default.
4545
- If your AKS cluster has an [Authorized IP range enabled to access the API server](../aks/api-server-authorized-ip-ranges.md), enable the Azure Machine Learning control plane IP ranges for the AKS cluster. The Azure Machine Learning control plane is deployed across paired regions. Without access to the API server, the machine learning pods can't be deployed. Use the [IP ranges](https://www.microsoft.com/download/confirmation.aspx?id=56519) for both the [paired regions](../availability-zones/cross-region-replication-azure.md) when enabling the IP ranges in an AKS cluster.
4646
- Azure Machine Learning does not support attaching an AKS cluster cross subscription. If you have an AKS cluster in a different subscription, you must first [connect it to Azure-Arc](../azure-arc/kubernetes/quickstart-connect-cluster.md) and specify in the same subscription as your Azure Machine Learning workspace.
4747
- Azure Machine Learning does not guarantee support for all preview stage features in AKS. For example, [Azure AD pod identity](../aks/use-azure-ad-pod-identity.md) is not supported.

0 commit comments

Comments
 (0)