You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/limit-egress-traffic.md
+81-3Lines changed: 81 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn what ports and addresses are required to control egress traff
4
4
services: container-service
5
5
ms.topic: article
6
6
ms.author: jpalma
7
-
ms.date: 06/27/2022
7
+
ms.date: 07/05/2022
8
8
author: palma21
9
9
10
10
#Customer intent: As an cluster operator, I want to restrict egress traffic for nodes to only access defined ports and addresses and improve cluster security.
@@ -458,6 +458,13 @@ You'll define the outbound type to use the UDR that already exists on the subnet
458
458
>
459
459
> The AKS feature for [**API server authorized IP ranges**](api-server-authorized-ip-ranges.md) can be added to limit API server access to only the firewall's public endpoint. The authorized IP ranges feature is denoted in the diagram as optional. When enabling the authorized IP range feature to limit API server access, your developer tools must use a jumpbox from the firewall's virtual network or you must add all developer endpoints to the authorized IP range.
460
460
461
+
#### Create an AKS cluster with system-assigned identities
462
+
463
+
> [!NOTE]
464
+
> AKS will create a system-assigned kubelet identity in the Node resource group if you do not [specify your own kubelet managed identity][Use a pre-created kubelet managed identity].
465
+
466
+
You can create an AKS cluster using a system-assigned managed identity by running the following CLI command.
467
+
461
468
```azurecli
462
469
az aks create -g $RG -n $AKSNAME -l $LOC \
463
470
--node-count 3 \
@@ -470,8 +477,76 @@ az aks create -g $RG -n $AKSNAME -l $LOC \
470
477
> [!NOTE]
471
478
> For creating and using your own VNet and route table where the resources are outside of the worker node resource group, the CLI will add the role assignment automatically. If you are using an ARM template or other client, you need to use the Principal ID of the cluster managed identity to perform a [role assignment.][add role to identity]
472
479
>
473
-
> If you are not using the CLI but using your own VNet or route table which are outside of the worker node resource group, it's recommended to use [user-assigned control plane identity][Bring your own control plane managed identity]. For system-assigned control plane identity, we cannot get the identity ID before creating cluster, which causes delay for role assignment to take effect.
480
+
> If you are not using the CLI but using your own VNet or route table which are outside of the worker node resource group, it's recommended to use [user-assigned control plane identity][Create an AKS cluster with user-assigned identities]. For system-assigned control plane identity, we cannot get the identity ID before creating cluster, which causes delay for role assignment to take effect.
474
481
482
+
#### Create an AKS cluster with user-assigned identities
483
+
484
+
##### Create user-assigned managed identities
485
+
486
+
If you don't have a control plane managed identity, you can create by running the following [az identity create][az-identity-create] command:
487
+
488
+
```azurecli-interactive
489
+
az identity create --name myIdentity --resource-group myResourceGroup
##### Create an AKS cluster with user-assigned identities
533
+
534
+
Now you can use the following command to create your AKS cluster with your existing identities in the subnet. Provide the control plane identity resource ID via `assign-identity` and the kubelet managed identity via `assign-kubelet-identity`:
> For creating and using your own VNet and route table where the resources are outside of the worker node resource group, the CLI will add the role assignment automatically. If you are using an ARM template or other client, you need to use the Principal ID of the cluster managed identity to perform a [role assignment.][add role to identity]
475
550
476
551
### Enable developer access to the API server
477
552
@@ -796,4 +871,7 @@ If you want to restrict how pods communicate between themselves and East-West tr
796
871
[aks-faq]: faq.md
797
872
[aks-private-clusters]: private-clusters.md
798
873
[add role to identity]: use-managed-identity.md#add-role-assignment-for-control-plane-identity
799
-
[Bring your own control plane managed identity]: use-managed-identity.md#bring-your-own-control-plane-managed-identity
874
+
[Create an AKS cluster with user-assigned identities]: limit-egress-traffic.md#create-an-aks-cluster-with-user-assigned-identities
875
+
[Use a pre-created kubelet managed identity]: use-managed-identity.md#use-a-pre-created-kubelet-managed-identity
0 commit comments