You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -21,6 +21,13 @@ For a conceptual look at connecting clusters to Azure Arc, see [Azure Arc-enable
21
21
22
22
* A basic understanding of [Kubernetes core concepts](../../aks/concepts-clusters-workloads.md).
23
23
24
+
* An identity (user or service principal) which can be used to [log in to Azure CLI](/cli/azure/authenticate-azure-cli) and connect your cluster to Azure Arc.
25
+
26
+
> [!IMPORTANT]
27
+
>
28
+
> * The identity must have 'Read' and 'Write' permissions on the Azure Arc-enabled Kubernetes resource type (`Microsoft.Kubernetes/connectedClusters`).
29
+
> * The [Kubernetes Cluster - Azure Arc Onboarding built-in role](../../role-based-access-control/built-in-roles.md#kubernetes-cluster---azure-arc-onboarding) can be used for this identity. This role is useful for at-scale onboarding, as it has only the granular permissions required to connect clusters to Azure Arc, and doesn't have permission to update, delete, or modify any other clusters or other Azure resources.
30
+
24
31
*[Install or upgrade Azure CLI](/cli/azure/install-azure-cli) to version >= 2.16.0
25
32
26
33
* Install the **connectedk8s** Azure CLI extension of version >= 1.2.0:
@@ -29,10 +36,6 @@ For a conceptual look at connecting clusters to Azure Arc, see [Azure Arc-enable
29
36
az extension add --name connectedk8s
30
37
```
31
38
32
-
*[Log in to Azure CLI](/cli/azure/authenticate-azure-cli) using the identity (user or service principal) that you want to use for connecting your cluster to Azure Arc.
33
-
* The identity used needs to at least have 'Read' and 'Write' permissions on the Azure Arc-enabled Kubernetes resource type (`Microsoft.Kubernetes/connectedClusters`).
34
-
* The [Kubernetes Cluster - Azure Arc Onboarding built-in role](../../role-based-access-control/built-in-roles.md#kubernetes-cluster---azure-arc-onboarding) is useful for at-scale onboarding as it has the granular permissions required to only connect clusters to Azure Arc. This role doesn't have the permissions to update, delete, or modify any other clusters or other Azure resources.
35
-
36
39
* An up-and-running Kubernetes cluster. If you don't have one, you can create a cluster using one of these options:
37
40
*[Kubernetes in Docker (KIND)](https://kind.sigs.k8s.io/)
38
41
* Create a Kubernetes cluster using Docker for [Mac](https://docs.docker.com/docker-for-mac/#kubernetes) or [Windows](https://docs.docker.com/docker-for-windows/#kubernetes)
@@ -89,23 +92,6 @@ For a conceptual look at connecting clusters to Azure Arc, see [Azure Arc-enable
89
92
90
93
---
91
94
92
-
## Meet network requirements
93
-
94
-
> [!IMPORTANT]
95
-
> Azure Arc agents require the following outbound URLs on `https://:443` to function.
96
-
> For `*.servicebus.windows.net`, websockets need to be enabled for outbound access on firewall and proxy.
97
-
98
-
| Endpoint (DNS) | Description |
99
-
| ----------------- | ------------- |
100
-
|`https://management.azure.com` (for Azure Cloud), `https://management.usgovcloudapi.net` (for Azure US Government) | Required for the agent to connect to Azure and register the cluster. |
101
-
|`https://<region>.dp.kubernetesconfiguration.azure.com` (for Azure Cloud), `https://<region>.dp.kubernetesconfiguration.azure.us` (for Azure US Government) | Data plane endpoint for the agent to push status and fetch configuration information. |
102
-
|`https://login.microsoftonline.com`, `https://<region>.login.microsoft.com`, `login.windows.net` (for Azure Cloud), `https://login.microsoftonline.us`, `<region>.login.microsoftonline.us` (for Azure US Government) | Required to fetch and update Azure Resource Manager tokens. |
103
-
|`https://mcr.microsoft.com`, `https://*.data.mcr.microsoft.com`| Required to pull container images for Azure Arc agents. |
104
-
|`https://gbl.his.arc.azure.com` (for Azure Cloud), `https://gbl.his.arc.azure.us` (for Azure US Government) | Required to get the regional endpoint for pulling system-assigned Managed Identity certificates. |
105
-
|`https://*.his.arc.azure.com` (for Azure Cloud), `https://usgv.his.arc.azure.us` (for Azure US Government) | Required to pull system-assigned Managed Identity certificates. |
106
-
|`*.servicebus.windows.net`, `guestnotificationservice.azure.com`, `*.guestnotificationservice.azure.com`, `sts.windows.net`| For [Cluster Connect](cluster-connect.md) and for [Custom Location](custom-locations.md) based scenarios. |
107
-
|`https://k8connecthelm.azureedge.net`|`az connectedk8s connect` uses Helm 3 to deploy Azure Arc agents on the Kubernetes cluster. This endpoint is needed for Helm client download to facilitate deployment of the agent helm chart. |
108
-
109
95
## Register providers for Azure Arc-enabled Kubernetes
110
96
111
97
### [Azure CLI](#tab/azure-cli)
@@ -150,6 +136,23 @@ For a conceptual look at connecting clusters to Azure Arc, see [Azure Arc-enable
150
136
151
137
---
152
138
139
+
## Meet network requirements
140
+
141
+
> [!IMPORTANT]
142
+
> Azure Arc agents require the following outbound URLs on `https://:443` to function.
143
+
> For `*.servicebus.windows.net`, websockets need to be enabled for outbound access on firewall and proxy.
144
+
145
+
| Endpoint (DNS) | Description |
146
+
| ----------------- | ------------- |
147
+
|`https://management.azure.com` (for Azure Cloud), `https://management.usgovcloudapi.net` (for Azure US Government) | Required for the agent to connect to Azure and register the cluster. |
148
+
|`https://<region>.dp.kubernetesconfiguration.azure.com` (for Azure Cloud), `https://<region>.dp.kubernetesconfiguration.azure.us` (for Azure US Government) | Data plane endpoint for the agent to push status and fetch configuration information. |
149
+
|`https://login.microsoftonline.com`, `https://<region>.login.microsoft.com`, `login.windows.net` (for Azure Cloud), `https://login.microsoftonline.us`, `<region>.login.microsoftonline.us` (for Azure US Government) | Required to fetch and update Azure Resource Manager tokens. |
150
+
|`https://mcr.microsoft.com`, `https://*.data.mcr.microsoft.com`| Required to pull container images for Azure Arc agents. |
151
+
|`https://gbl.his.arc.azure.com` (for Azure Cloud), `https://gbl.his.arc.azure.us` (for Azure US Government) | Required to get the regional endpoint for pulling system-assigned Managed Identity certificates. |
152
+
|`https://*.his.arc.azure.com` (for Azure Cloud), `https://usgv.his.arc.azure.us` (for Azure US Government) | Required to pull system-assigned Managed Identity certificates. |
153
+
|`*.servicebus.windows.net`, `guestnotificationservice.azure.com`, `*.guestnotificationservice.azure.com`, `sts.windows.net`| For [Cluster Connect](cluster-connect.md) and for [Custom Location](custom-locations.md) based scenarios. |
154
+
|`https://k8connecthelm.azureedge.net`|`az connectedk8s connect` uses Helm 3 to deploy Azure Arc agents on the Kubernetes cluster. This endpoint is needed for Helm client download to facilitate deployment of the agent helm chart. |
0 commit comments