You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/use-managed-identity.md
+16-4Lines changed: 16 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -96,7 +96,7 @@ az aks update \
96
96
--enable-managed-identity
97
97
```
98
98
99
-
After you update the cluster, the control plane and pods use the system-assigned managed identity for authorization when accessing other services in Azure. Kubelet continues using a service principal until you upgrade your agentpool. You can use the `az aks nodepool upgrade --resource-group myResourceGroup --cluster-name myAKSCluster --name mynodepool --node-image-only` command on your nodes to update to a managed identity. A node pool upgrade causes downtime for your AKS cluster as the nodes in the node pools are cordoned, drained, and re-imaged.
99
+
After you update the cluster to use a system-assigned managed identity instead of a service principal, the control plane and pods use the system-assigned managed identity for authorization when accessing other services in Azure. Kubelet continues using a service principal until you also upgrade your agentpool. You can use the `az aks nodepool upgrade --resource-group myResourceGroup --cluster-name myAKSCluster --name mynodepool --node-image-only` command on your nodes to update to a managed identity. A node pool upgrade causes downtime for your AKS cluster as the nodes in the node pools are cordoned, drained, and re-imaged.
100
100
101
101
> [!NOTE]
102
102
>
@@ -381,6 +381,9 @@ A successful AKS cluster creation using a kubelet managed identity should resemb
381
381
382
382
To update an existing cluster to use the kubelet managed identity, first get the current control plane managed identity for your AKS cluster.
383
383
384
+
> [!WARNING]
385
+
> Updating the kubelet managed identity upgrades your AKS cluster's node pools, which causes downtime for the cluster as the nodes in the node pools are cordoned/drained and reimaged.
386
+
384
387
1. Confirm your AKS cluster is using the user-assigned managed identity using the [`az aks show`][az-aks-show] command.
385
388
386
389
```azurecli-interactive
@@ -390,6 +393,7 @@ To update an existing cluster to use the kubelet managed identity, first get the
390
393
If your cluster is using a managed identity, the output shows `clientId` with a value of **msi**. A cluster using a service principal shows an object ID. For example:
391
394
392
395
```output
396
+
# The cluster is using a managed identity.
393
397
{
394
398
"clientId": "msi"
395
399
}
@@ -448,12 +452,20 @@ Your output for a successful cluster update using your own kubelet managed ident
448
452
},
449
453
```
450
454
451
-
> [!WARNING]
452
-
> Updating the kubelet managed identity upgrades your AKS cluster's node pools, which causes downtime for the cluster as the nodes in the node pools are cordoned/drained and reimaged.
453
-
454
455
> [!NOTE]
455
456
> If your cluster was using `--attach-acr` to pull from images from Azure Container Registry, run the `az aks update --resource-group myResourceGroup --name myAKSCluster --attach-acr <ACR Resource ID>` command after updating your cluster to let the newly-created kubelet used for managed identity get the permission to pull from ACR. Otherwise, you won't be able to pull from ACR after the upgrade.
456
457
458
+
### Get the properties of the kubelet identity
459
+
460
+
To get the properties of the kubelet identity, call [az aks show][az-aks-show] and query on the `identityProfile.kubeletidentity` property.
461
+
462
+
```azurecli-interactive
463
+
az aks show \
464
+
--name myAKSCluster \
465
+
--resource-group myResourceGroup \
466
+
--query "identityProfile.kubeletidentity"
467
+
```
468
+
457
469
### Pre-created kubelet identity limitations
458
470
459
471
Note the following limitations for the pre-created kubelet identity:
0 commit comments