Skip to content

Commit 76c62c3

Browse files
committed
kubelet identity
1 parent 67f9d5a commit 76c62c3

File tree

1 file changed

+16
-4
lines changed

1 file changed

+16
-4
lines changed

articles/aks/use-managed-identity.md

Lines changed: 16 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ az aks update \
9696
--enable-managed-identity
9797
```
9898

99-
After you update the cluster, the control plane and pods use the system-assigned managed identity for authorization when accessing other services in Azure. Kubelet continues using a service principal until you upgrade your agentpool. You can use the `az aks nodepool upgrade --resource-group myResourceGroup --cluster-name myAKSCluster --name mynodepool --node-image-only` command on your nodes to update to a managed identity. A node pool upgrade causes downtime for your AKS cluster as the nodes in the node pools are cordoned, drained, and re-imaged.
99+
After you update the cluster to use a system-assigned managed identity instead of a service principal, the control plane and pods use the system-assigned managed identity for authorization when accessing other services in Azure. Kubelet continues using a service principal until you also upgrade your agentpool. You can use the `az aks nodepool upgrade --resource-group myResourceGroup --cluster-name myAKSCluster --name mynodepool --node-image-only` command on your nodes to update to a managed identity. A node pool upgrade causes downtime for your AKS cluster as the nodes in the node pools are cordoned, drained, and re-imaged.
100100

101101
> [!NOTE]
102102
>
@@ -381,6 +381,9 @@ A successful AKS cluster creation using a kubelet managed identity should resemb
381381

382382
To update an existing cluster to use the kubelet managed identity, first get the current control plane managed identity for your AKS cluster.
383383

384+
> [!WARNING]
385+
> Updating the kubelet managed identity upgrades your AKS cluster's node pools, which causes downtime for the cluster as the nodes in the node pools are cordoned/drained and reimaged.
386+
384387
1. Confirm your AKS cluster is using the user-assigned managed identity using the [`az aks show`][az-aks-show] command.
385388

386389
```azurecli-interactive
@@ -390,6 +393,7 @@ To update an existing cluster to use the kubelet managed identity, first get the
390393
If your cluster is using a managed identity, the output shows `clientId` with a value of **msi**. A cluster using a service principal shows an object ID. For example:
391394
392395
```output
396+
# The cluster is using a managed identity.
393397
{
394398
"clientId": "msi"
395399
}
@@ -448,12 +452,20 @@ Your output for a successful cluster update using your own kubelet managed ident
448452
},
449453
```
450454

451-
> [!WARNING]
452-
> Updating the kubelet managed identity upgrades your AKS cluster's node pools, which causes downtime for the cluster as the nodes in the node pools are cordoned/drained and reimaged.
453-
454455
> [!NOTE]
455456
> If your cluster was using `--attach-acr` to pull from images from Azure Container Registry, run the `az aks update --resource-group myResourceGroup --name myAKSCluster --attach-acr <ACR Resource ID>` command after updating your cluster to let the newly-created kubelet used for managed identity get the permission to pull from ACR. Otherwise, you won't be able to pull from ACR after the upgrade.
456457
458+
### Get the properties of the kubelet identity
459+
460+
To get the properties of the kubelet identity, call [az aks show][az-aks-show] and query on the `identityProfile.kubeletidentity` property.
461+
462+
```azurecli-interactive
463+
az aks show \
464+
--name myAKSCluster \
465+
--resource-group myResourceGroup \
466+
--query "identityProfile.kubeletidentity"
467+
```
468+
457469
### Pre-created kubelet identity limitations
458470

459471
Note the following limitations for the pre-created kubelet identity:

0 commit comments

Comments
 (0)