You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/concepts-network.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -98,7 +98,7 @@ For more information, see [Configure Azure CNI for an AKS cluster][aks-configure
98
98
99
99
[Azure CNI Powered by Cilium][azure-cni-powered-by-cilium] uses [Cilium](https://cilium.io) to provide high-performance networking, observability, and network policy enforcement. It integrates natively with [Azure CNI Overlay][azure-cni-overlay] for scalable IP address management (IPAM).
100
100
101
-
Additionally, Cilium enforces network policies by default, without requiring a separate network policy engine. Azure CNI Powered by Cilium can scale beyond [Azure Network Policy Manager's limits of 250 nodes / 20-K pod][use-network-policies] by using ePBF programs and a more efficient API object structure.
101
+
Additionally, Cilium enforces network policies by default, without requiring a separate network policy engine. Azure CNI Powered by Cilium can scale beyond [Azure Network Policy Manager's limits of 250 nodes / 20-K pod][use-network-policies] by using eBPF programs and a more efficient API object structure.
102
102
103
103
Azure CNI Powered by Cilium is the recommended option for clusters that require network policy enforcement.
This article discusses solutions to problems that you might encounter when you use a managed identity with your Automation account. For general information about using managed identity with Automation accounts, see [Azure Automation account authentication overview](../automation-security-overview.md#managed-identities).
13
13
14
+
15
+
## Scenario: Runbook with system assigned managed identity fails with 400 error message
16
+
17
+
### Issue
18
+
19
+
Runbook with system assigned managed identity fails with the error as `unable to acquire for tenant organizations with error ManagedIdentityCredential authentication failed. Managed System Identity not found! Status 400 (Bad Request)`
20
+
21
+
22
+
### Cause
23
+
You haven't assigned permissions after creating the system-assigned managed identity.
24
+
25
+
### Resolution
26
+
Ensure to assign the appropriate permissions for system-assigned managed identity. [Using a system-assigned managed identity for an Azure Automation account](../enable-managed-identity-for-automation.md)
27
+
28
+
14
29
## Scenario: Managed Identity in a Runbook cannot authenticate against Azure
:::image type="content" source="./media/use-flink-delta-connector/webssh-pod.png" alt-text="Screenshot showing how to submit the jar on WebSSH pod." lightbox="./media/use-flink-delta-connector/webssh-pod.png":::
331
+
1. Submit the cluster, you should be able to see the job in Flink UI.
:::image type="content" source="./media/use-flink-delta-connector/check-job-on-flink-ui.png" alt-text="Screenshot showing how to check the job on Flink UI." lightbox="./media/use-flink-delta-connector/check-job-on-flink-ui.png":::
335
+
1. Find Results in ADLS.
328
336
329
-
### Check the delta output on Azure portal
337
+
:::image type="content" source="./media/use-flink-delta-connector/output.png" alt-text="Screenshot showing the output." lightbox="./media/use-flink-delta-connector/output.png":::
330
338
331
-
:::image type="content" source="./media/use-flink-delta-connector/delta-output.png" alt-text="Screenshot showing the delta output." lightbox="./media/use-flink-delta-connector/delta-output.png":::
0 commit comments