You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/azure-disk-volume.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ You also need the Azure CLI version 2.0.59 or later installed and configured. Ru
26
26
27
27
## Create an Azure disk
28
28
29
-
When you create an Azure disk for use with AKS, you can create the disk resource in the **node** resource group. This approach allows the AKS cluster to access and manage the disk resource. If you instead create the disk in a separate resource group, you must grant the Azure Kubernetes Service (AKS) service principal for your cluster the `Contributor` role to the disk's resource group.
29
+
When you create an Azure disk for use with AKS, you can create the disk resource in the **node** resource group. This approach allows the AKS cluster to access and manage the disk resource. If you instead create the disk in a separate resource group, you must grant the Azure Kubernetes Service (AKS) service principal for your cluster the `Contributor` role to the disk's resource group. Alternatively, you can use the system assigned managed identity for permissions instead of the service principal. For more information, see [Use managed identities](use-managed-identity.md).
30
30
31
31
For this article, create the disk in the node resource group. First, get the resource group name with the [az aks show][az-aks-show] command and add the `--query nodeResourceGroup` query parameter. The following example gets the node resource group for the AKS cluster name *myAKSCluster* in the resource group name *myResourceGroup*:
Copy file name to clipboardExpand all lines: articles/aks/configure-azure-cni.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,6 +22,7 @@ This article shows you how to use *Azure CNI* networking to create and use a vir
22
22
* The service principal used by the AKS cluster must have at least [Network Contributor](../role-based-access-control/built-in-roles.md#network-contributor) permissions on the subnet within your virtual network. If you wish to define a [custom role](../role-based-access-control/custom-roles.md) instead of using the built-in Network Contributor role, the following permissions are required:
* Instead of a service principal, you can use the system assigned managed identity for permissions. For more information, see [Use managed identities](use-managed-identity.md).
Copy file name to clipboardExpand all lines: articles/aks/static-ip.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,6 +69,8 @@ az role assignment create \
69
69
--scope /subscriptions/<subscription id>/resourceGroups/<resource group name>
70
70
```
71
71
72
+
Alternatively, you can use the system assigned managed identity for permissions instead of the service principal. For more information, see [Use managed identities](use-managed-identity.md).
73
+
72
74
To create a *LoadBalancer* service with the static public IP address, add the `loadBalancerIP` property and the value of the static public IP address to the YAML manifest. Create a file named `load-balancer-service.yaml` and copy in the following YAML. Provide your own public IP address created in the previous step. The following example also sets the annotation to the resource group named *myResourceGroup*. Provide your own resource group name.
Copy file name to clipboardExpand all lines: articles/aks/use-managed-identity.md
+14-38Lines changed: 14 additions & 38 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,11 +5,11 @@ services: container-service
5
5
author: saudas
6
6
manager: saudas
7
7
ms.topic: article
8
-
ms.date: 09/11/2019
8
+
ms.date: 03/10/2019
9
9
ms.author: saudas
10
10
---
11
11
12
-
# Preview - Use managed identities in Azure Kubernetes Service
12
+
# Use managed identities in Azure Kubernetes Service
13
13
14
14
Currently, an Azure Kubernetes Service (AKS) cluster (specifically, the Kubernetes cloud provider) requires a *service principal* to create additional resources like load balancers and managed disks in Azure. Either you must provide a service principal or AKS creates one on your behalf. Service principals typically have an expiration date. Clusters eventually reach a state in which the service principal must be renewed to keep the cluster working. Managing service principals adds complexity.
15
15
@@ -20,46 +20,13 @@ AKS creates two managed identities:
20
20
-**System-assigned managed identity**: The identity that the Kubernetes cloud provider uses to create Azure resources on behalf of the user. The life cycle of the system-assigned identity is tied to that of the cluster. The identity is deleted when the cluster is deleted.
21
21
-**User-assigned managed identity**: The identity that's used for authorization in the cluster. For example, the user-assigned identity is used to authorize AKS to use access control records (ACRs), or to authorize the kubelet to get metadata from Azure.
22
22
23
-
In this preview period, a service principal is still required. It's used for authorization of add-ons such as monitoring, virtual nodes, Azure Policy, and HTTP application routing. Work is underway to remove the dependency of add-ons on the service principal name (SPN). Eventually, the requirement of an SPN in AKS will be removed completely.
24
-
25
-
> [!IMPORTANT]
26
-
> AKS preview features are available on a self-service, opt-in basis. Previews are provided "as-is" and "as available," and are excluded from the Service Level Agreements and limited warranty. AKS previews are partially covered by customer support on best-effort basis. As such, these features are not meant for production use. For more information, see the following support articles:
27
-
>
28
-
> -[AKS Support Policies](support-policies.md)
29
-
> -[Azure Support FAQ](faq.md)
23
+
Add-ons also authenticate using a managed identity. For each add-on, a managed identity is created by AKS and lasts for the life of the add-on. For creating and using your own VNet, static IP address, or attached Azure disk where the resources are outside of the MC_* resource group, use the PrincipalID of the cluster to perform a role assignment. For more information on role assignment, see [Delegate access to other Azure resources](kubernetes-service-principal.md#delegate-access-to-other-azure-resources).
30
24
31
25
## Before you begin
32
26
33
-
You must have the following resources installed:
34
-
35
-
- The Azure CLI, version 2.0.70 or later
36
-
- The aks-preview 0.4.14 extension
37
-
38
-
To install the aks-preview 0.4.14 extension or later, use the following Azure CLI commands:
39
-
40
-
```azurecli
41
-
az extension add --name aks-preview
42
-
az extension list
43
-
```
44
-
45
-
> [!CAUTION]
46
-
> After you register a feature on a subscription, you can't currently unregister that feature. When you enable some preview features, defaults might be used for all AKS clusters created afterward in the subscription. Don't enable preview features on production subscriptions. Instead, use a separate subscription to test preview features and gather feedback.
47
-
48
-
```azurecli-interactive
49
-
az feature register --name MSIPreview --namespace Microsoft.ContainerService
50
-
```
27
+
You must have the following resource installed:
51
28
52
-
It might take several minutes for the status to show as **Registered**. You can check the registration status by using the [az feature list](https://docs.microsoft.com/cli/azure/feature?view=azure-cli-latest#az-feature-list) command:
53
-
54
-
```azurecli-interactive
55
-
az feature list -o table --query "[?contains(name, 'Microsoft.ContainerService/MSIPreview')].{Name:name,State:properties.state}"
56
-
```
57
-
58
-
When the status shows as registered, refresh the registration of the `Microsoft.ContainerService` resource provider by using the [az provider register](https://docs.microsoft.com/cli/azure/provider?view=azure-cli-latest#az-provider-register) command:
59
-
60
-
```azurecli-interactive
61
-
az provider register --namespace Microsoft.ContainerService
62
-
```
29
+
- The Azure CLI, version 2.2.0 or later
63
30
64
31
## Create an AKS cluster with managed identities
65
32
@@ -78,6 +45,15 @@ Then, create an AKS cluster:
78
45
az aks create -g MyResourceGroup -n MyManagedCluster --enable-managed-identity
79
46
```
80
47
48
+
A successful cluster creation using managed identities contains this service principal profile information:
0 commit comments