Skip to content

Commit 95e966b

Browse files
committed
prereqs and roles
1 parent f34b193 commit 95e966b

File tree

2 files changed

+28
-39
lines changed

2 files changed

+28
-39
lines changed

articles/azure-arc/includes/arc-region-note.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ author: MikeRayMSFT
33
ms.author: mikeray
44
ms.service: azure-arc
55
ms.topic: include
6-
ms.date: 12/13/2022
6+
ms.date: 10/27/2023
77
---
88

99
To get the region segment of a regional endpoint, remove all spaces from the Azure region name. For example, *East US 2* region, the region name is `eastus2`.
@@ -12,6 +12,10 @@ For example: `san-af-<region>-prod.azurewebsites.net` should be `san-af-eastus2-
1212

1313
To see a list of all regions, run this command:
1414

15-
```azcli
15+
```azure-cli
1616
az account list-locations -o table
1717
```
18+
19+
```azurepowershell
20+
Get-AzLocation | Format-Table
21+
```

articles/azure-arc/kubernetes/cluster-connect.md

Lines changed: 22 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: "Use cluster connect to securely connect to Azure Arc-enabled Kubernetes clusters."
3-
ms.date: 10/12/2023
3+
ms.date: 10/27/2023
44
ms.topic: how-to
55
ms.custom: devx-track-azurecli
66
description: "With cluster connect, you can securely connect to Azure Arc-enabled Kubernetes clusters from anywhere without requiring any inbound port to be enabled on the firewall."
@@ -19,9 +19,23 @@ Before you begin, review the [conceptual overview of the cluster connect feature
1919

2020
## Prerequisites
2121

22+
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
23+
- An existing Azure Arc-enabled Kubernetes connected cluster.
24+
- If you haven't connected a cluster yet, use our [quickstart](quickstart-connect-cluster.md).
25+
- [Upgrade your agents](agent-upgrade.md#manually-upgrade-agents) to the latest version.
26+
- In addition to meeting the [network requirements for Arc-enabled Kubernetes](network-requirements.md), enable these endpoints for outbound access:
27+
28+
| Endpoint | Port |
29+
|----------------|-------|
30+
|`*.servicebus.windows.net` | 443 |
31+
|`guestnotificationservice.azure.com`, `*.guestnotificationservice.azure.com` | 443 |
32+
33+
> [!NOTE]
34+
> To translate the `*.servicebus.windows.net` wildcard into specific endpoints, use the command `\GET https://guestnotificationservice.azure.com/urls/allowlist?api-version=2020-01-01&location=<location>`. Within this command, the region must be specified for the `<location>` placeholder.
35+
36+
2237
### [Azure CLI](#tab/azure-cli)
2338

24-
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
2539

2640
- [Install](/cli/azure/install-azure-cli) or [update](/cli/azure/update-azure-cli) Azure CLI to the latest version.
2741

@@ -37,20 +51,6 @@ Before you begin, review the [conceptual overview of the cluster connect feature
3751
az extension update --name connectedk8s
3852
```
3953

40-
- An existing Azure Arc-enabled Kubernetes connected cluster.
41-
- If you haven't connected a cluster yet, use our [quickstart](quickstart-connect-cluster.md).
42-
- [Upgrade your agents](agent-upgrade.md#manually-upgrade-agents) to the latest version.
43-
44-
- In addition to meeting the [network requirements for Arc-enabled Kubernetes](network-requirements.md), enable these endpoints for outbound access:
45-
46-
| Endpoint | Port |
47-
|----------------|-------|
48-
|`*.servicebus.windows.net` | 443 |
49-
|`guestnotificationservice.azure.com`, `*.guestnotificationservice.azure.com` | 443 |
50-
51-
> [!NOTE]
52-
> To translate the `*.servicebus.windows.net` wildcard into specific endpoints, use the command `\GET https://guestnotificationservice.azure.com/urls/allowlist?api-version=2020-01-01&location=<location>`. Within this command, the region must be specified for the `<location>` placeholder.
53-
5454
- Replace the placeholders and run the below command to set the environment variables used in this document:
5555

5656
```azurecli
@@ -61,24 +61,8 @@ Before you begin, review the [conceptual overview of the cluster connect feature
6161

6262
### [Azure PowerShell](#tab/azure-powershell)
6363

64-
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
65-
6664
- Install [Azure PowerShell version 6.6.0 or later](/powershell/azure/install-azure-powershell).
6765

68-
- An existing Azure Arc-enabled Kubernetes connected cluster.
69-
- If you haven't connected a cluster yet, use our [quickstart](quickstart-connect-cluster.md).
70-
- [Upgrade your agents](agent-upgrade.md#manually-upgrade-agents) to the latest version.
71-
72-
- In addition to meeting the [network requirements for Arc-enabled Kubernetes](network-requirements.md), enable these endpoints for outbound access:
73-
74-
| Endpoint | Port |
75-
|----------------|-------|
76-
|`*.servicebus.windows.net` | 443 |
77-
|`guestnotificationservice.azure.com`, `*.guestnotificationservice.azure.com` | 443 |
78-
79-
> [!NOTE]
80-
> To translate the `*.servicebus.windows.net` wildcard into specific endpoints, use the command `\GET https://guestnotificationservice.azure.com/urls/allowlist?api-version=2020-01-01&location=<location>`. Within this command, the region must be specified for the `<location>` placeholder.
81-
8266
- Replace the placeholders and run the below command to set the environment variables used in this document:
8367

8468
```azurepowershell
@@ -117,13 +101,13 @@ On the existing Arc-enabled cluster, create the ClusterRoleBinding with either M
117101
118102
1. Authorize the entity with appropriate permissions.
119103
120-
- If you are using Kubernetes native ClusterRoleBinding or RoleBinding for authorization checks on the cluster, with the `kubeconfig` file pointing to the `apiserver` of your cluster for direct access, you can create one mapped to the Microsoft Entra entity (service principal or user) that needs to access this cluster. Example:
104+
- If you are using Kubernetes native ClusterRoleBinding or RoleBinding for authorization checks on the cluster, with the `kubeconfig` file pointing to the `apiserver` of your cluster for direct access, you can create one mapped to the Microsoft Entra entity (service principal or user) that needs to access this cluster. For example:
121105
122106
```console
123107
kubectl create clusterrolebinding demo-user-binding --clusterrole cluster-admin --user=$AAD_ENTITY_OBJECT_ID
124108
```
125109
126-
- If you are using Azure RBAC for authorization checks on the cluster, you can create an Azure role assignment mapped to the Microsoft Entra entity. Example:
110+
- If you are using Azure RBAC for authorization checks on the cluster, you can create an applicable [Azure role assignment](azure-rbac.md#built-in-roles) mapped to the Microsoft Entra entity. For example:
127111
128112
```azurecli
129113
az role assignment create --role "Azure Arc Kubernetes Viewer" --assignee $AAD_ENTITY_OBJECT_ID --scope $ARM_ID_CLUSTER
@@ -148,15 +132,16 @@ On the existing Arc-enabled cluster, create the ClusterRoleBinding with either M
148132
149133
1. Authorize the entity with appropriate permissions.
150134
151-
- If you are using Kubernetes native ClusterRoleBinding or RoleBinding for authorization checks on the cluster, with the `kubeconfig` file pointing to the `apiserver` of your cluster for direct access, you can create one mapped to the Microsoft Entra entity (service principal or user) that needs to access this cluster. Example:
135+
- If you are using Kubernetes native ClusterRoleBinding or RoleBinding for authorization checks on the cluster, with the `kubeconfig` file pointing to the `apiserver` of your cluster for direct access, you can create one mapped to the Microsoft Entra entity (service principal or user) that needs to access this cluster. For example:
152136
153137
```console
154138
kubectl create clusterrolebinding demo-user-binding --clusterrole cluster-admin --user=$AAD_ENTITY_OBJECT_ID
155139
```
156140
157-
- If you are using [Azure RBAC for authorization checks](azure-rbac.md) on the cluster, you can create an Azure role assignment mapped to the Microsoft Entra entity. Example:
141+
- If you are using [Azure RBAC for authorization checks](azure-rbac.md) on the cluster,you can create an applicable [Azure role assignment](azure-rbac.md#built-in-roles) mapped to the Microsoft Entra entity. For example:
158142
159-
```azurecli
143+
```azurepowershell
144+
160145
az role assignment create --role "Azure Arc Kubernetes Viewer" --assignee $AAD_ENTITY_OBJECT_ID --scope $ARM_ID_CLUSTER
161146
az role assignment create --role "Azure Arc Enabled Kubernetes Cluster User Role" --assignee $AAD_ENTITY_OBJECT_ID --scope $ARM_ID_CLUSTER
162147
```

0 commit comments

Comments
 (0)