Skip to content

Commit 90fad75

Browse files
committed
updates
1 parent bcb390b commit 90fad75

File tree

4 files changed

+11
-8
lines changed

4 files changed

+11
-8
lines changed

articles/azure-arc/kubernetes/kubernetes-resource-view.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Access Kubernetes resources from Azure portal
3-
ms.date: 08/04/2023
3+
ms.date: 08/07/2023
44
ms.topic: how-to
55
description: Learn how to interact with Kubernetes resources to manage an Azure Arc-enabled Kubernetes cluster from the Azure portal.
66
---
@@ -15,18 +15,20 @@ The Azure portal includes a Kubernetes resource view for easy access to the Kube
1515

1616
- An account that can authenticate to the cluster and access the resources in the portal:
1717

18-
- If using [cluster connect with service account token authentication](cluster-connect.md#service-account-token-authentication-option), ensure that the account that will access the portal has a role that can authenticate to the cluster, such as `cluster-admin`:
19-
20-
```console
21-
kubectl create clusterrolebinding demo-user-binding --clusterrole cluster-admin --user=$AAD_ENTITY_OBJECT_ID`
22-
```
23-
2418
- If using [Azure RBAC](azure-rbac.md), ensure that the Azure Active Directory (Azure AD) account that will access the portal has a role that lets it authenticate to the cluster, such as [Azure Arc Kubernetes Viewer](/azure/role-based-access-control/built-in-roles):
2519

2620
```azurecli
2721
az role assignment create --role "Azure Arc Kubernetes Viewer" --assignee $AAD_ENTITY_OBJECT_ID --scope $ARM_ID_CLUSTER
2822
```
2923

24+
- If using [cluster connect with service account token authentication](cluster-connect.md#service-account-token-authentication-option), ensure that the account uses a Kubernetes cluster role that can authenticate to the cluster, such as `cluster-admin`:
25+
26+
```console
27+
kubectl create clusterrolebinding demo-user-binding --clusterrole cluster-admin --user=$AAD_ENTITY_OBJECT_ID`
28+
```
29+
30+
The same account must have an Azure role such as [Azure Arc Kubernetes Viewer](/azure/role-based-access-control/built-in-roles) in order to authenticate to the Azure portal and view Arc-enabled cluster resources.
31+
3032
## View Kubernetes resources
3133

3234
To see the Kubernetes resources, navigate to your cluster in the Azure portal. The navigation pane on the left is used to access your resources:
-140 KB
Loading
-19.5 KB
Loading

articles/azure-arc/kubernetes/toc.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,8 @@
9797
href: agent-upgrade.md
9898
- name: Use Private Link Scope
9999
href: private-link.md
100-
- name: Azure portal Kubernetes resource view
100+
- name: View resources in Azure portal
101+
displayName: kubernetes, yaml, workload
101102
href: kubernetes-resource-view.md
102103
- name: Deploy applications consistently
103104
displayName: GitOps, flux, configuration, policy

0 commit comments

Comments
 (0)