Skip to content

Commit 6b148db

Browse files
committed
updated Deploy App section
1 parent 16269b2 commit 6b148db

File tree

1 file changed

+19
-7
lines changed

1 file changed

+19
-7
lines changed

articles/aks/workload-identity-deploy-cluster.md

Lines changed: 19 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -140,13 +140,6 @@ az identity federated-credential create --name myfederatedIdentity --identity-na
140140
141141
## Deploy your application
142142

143-
> [!IMPORTANT]
144-
> Ensure your application pods using workload identity have added the following label [azure.workload.identity/use: "true"] to your running pods/deployments, otherwise the pods will fail once restarted.
145-
146-
```azurecli-interactive
147-
kubectl apply -f <your application>
148-
```
149-
150143
When deploying your application pods, it should reference the service account created in the Create Kubernetes service account step. The following manifest demonstrates how to reference the account, specifically `metadata\namespace` and `spec\serviceAccountName` properties:
151144

152145
```yml
@@ -173,6 +166,25 @@ spec:
173166
EOF
174167
```
175168

169+
> [!IMPORTANT]
170+
> Ensure your application pods using workload identity have added the following label [azure.workload.identity/use: "true"] to your running pods/deployments, otherwise the pods will fail once restarted.
171+
172+
```azurecli-interactive
173+
kubectl apply -f <your application>
174+
```
175+
176+
To check whether all properties are injected properly by the webhook, use the [kubectl describe][kubectl-describe] command:
177+
178+
```bash
179+
kubectl describe pod containerName
180+
```
181+
182+
To verify that pod is able to get a token and access the resource, use the kubectl logs command:
183+
184+
```bash
185+
kubectl logs containerName
186+
```
187+
176188
## Optional - Grant permissions to access Azure Key Vault
177189

178190
This step is necessary if you need to access secrets, keys, and certificates that are mounted in Azure Key Vault from a pod. Perform the following steps to configure access with a managed identity. These steps assume you have an Azure Key Vault already created and configured in your subscription. If you don't have one, see [Create an Azure Key Vault using the Azure CLI][create-key-vault-azure-cli].

0 commit comments

Comments
 (0)