You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/ai-toolchain-operator.md
+34-7Lines changed: 34 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -75,6 +75,8 @@ This article shows you how to enable the AI toolchain operator add-on and deploy
75
75
76
76
## Enable the AI toolchain operator add-on on an AKS cluster
77
77
78
+
The following sections describe how to create an AKS cluster with the AI toolchain operator add-on enabled and deploy a default hosted AI model.
79
+
78
80
### Create an AKS cluster with the AI toolchain operator add-on enabled
79
81
80
82
1. Create an Azure resource group using the [`az group create`][az-group-create] command.
@@ -86,7 +88,12 @@ This article shows you how to enable the AI toolchain operator add-on and deploy
86
88
2. Create an AKS cluster with the AI toolchain operator add-on enabled using the [`az aks create`][az-aks-create] command with the `--enable-ai-toolchain-operator` and `--enable-oidc-issuer` flags.
87
89
88
90
```azurecli-interactive
89
-
az aks create --location ${AZURE_LOCATION} --resource-group ${AZURE_RESOURCE_GROUP} --name ${CLUSTER_NAME} --enable-managed-identity --enable-oidc-issuer --enable-ai-toolchain-operator
91
+
az aks create --location ${AZURE_LOCATION} \
92
+
--resource-group ${AZURE_RESOURCE_GROUP} \
93
+
--name ${CLUSTER_NAME} \
94
+
--enable-managed-identity \
95
+
--enable-oidc-issuer \
96
+
--enable-ai-toolchain-operator
90
97
```
91
98
92
99
> [!NOTE]
@@ -111,30 +118,49 @@ This article shows you how to enable the AI toolchain operator add-on and deploy
111
118
3. Export environment variables for the MC resource group, principal ID identity, and KAITO identity using the following commands:
112
119
113
120
```azurecli-interactive
114
-
export MC_RESOURCE_GROUP=$(az aks show --resource-group ${AZURE_RESOURCE_GROUP} --name ${CLUSTER_NAME} --query nodeResourceGroup -o tsv)
* Get the AKS OIDC Issuer URL and export it as an environment variable:
120
135
121
136
```azurecli-interactive
122
-
export AKS_OIDC_ISSUER=$(az aks show --resource-group "${AZURE_RESOURCE_GROUP}" --name "${CLUSTER_NAME}" --query "oidcIssuerProfile.issuerUrl" -o tsv)
137
+
export AKS_OIDC_ISSUER=$(az aks show --resource-group "${AZURE_RESOURCE_GROUP}" \
138
+
--name "${CLUSTER_NAME}" \
139
+
--query "oidcIssuerProfile.issuerUrl" \
140
+
-o tsv)
123
141
```
142
+
124
143
## Create role assignment for the service principal
144
+
125
145
* Create a new role assignment for the service principal using the [`az role assignment create`][az-role-assignment-create] command.
126
146
127
147
```azurecli-interactive
128
-
az role assignment create --role "Contributor" --assignee "${PRINCIPAL_ID}" --scope "/subscriptions/${AZURE_SUBSCRIPTION_ID}/resourcegroups/${AZURE_RESOURCE_GROUP}"
* Create the federated identity credential between the managed identity, AKS OIDC issuer, and subject using the [`az identity federated-credential create`][az-identity-federated-credential-create] command.
0 commit comments