You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/keda-workload-identity.md
+1-21Lines changed: 1 addition & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -147,15 +147,6 @@ This article shows you how to securely scale your applications with the Kubernet
147
147
148
148
## Create role assignments
149
149
150
-
1. Get the role ID for the Azure Service Bus Data Owner role using the [`az role definition list`][az-role-definition-list] command with the `--query` flag set to `"[].id"`.
151
-
152
-
```azurecli-interactive
153
-
ROLE_ID=$(az role definition list \
154
-
--name "Azure Service Bus Data Owner" \
155
-
--query "[].id"
156
-
--output tsv)
157
-
```
158
-
159
150
1. Get the object ID for the managed identity using the [`az identity show`][az-identity-show] command with the `--query` flag set to `"principalId"`.
160
151
161
152
```azurecli-interactive
@@ -180,23 +171,12 @@ This article shows you how to securely scale your applications with the Kubernet
180
171
181
172
```azurecli-interactive
182
173
az role assignment create \
183
-
--role $ROLE_ID \
174
+
--role "Azure Service Bus Data Owner" \
184
175
--assignee-object-id $MI_OBJECT_ID \
185
176
--assignee-principal-type ServicePrincipal \
186
177
--scope $SB_ID
187
178
```
188
179
189
-
1. Assign the Azure Service Bus Data Owner role to your signed-in user ID [`az role assignment create`][az-role-assignment-create] command.
190
-
191
-
```azurecli-interactive
192
-
az role assignment create \
193
-
--role $ROLE_ID \
194
-
--assignee-object-id $(az ad signed-in-user show --query id --output tsv) \
195
-
--assignee-principal-type User \
196
-
--scope $SB_ID
197
-
```
198
-
199
-
200
180
## Enable Workload Identity on KEDA operator
201
181
202
182
1. After creating the federated credential for the `keda-operator` ServiceAccount, you will need to manually restart the `keda-operator` pods to ensure Workload Identity environment variables are injected into the pod.
0 commit comments