Skip to content

Commit 9d506b2

Browse files
authored
Merge pull request #200246 from CocoWang-wql/patch-1
Update configure-kubenet.md
2 parents 9c70b7b + 66911d5 commit 9d506b2

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

articles/aks/configure-kubenet.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Configure kubenet networking in Azure Kubernetes Service (AKS)
33
description: Learn how to configure kubenet (basic) network in Azure Kubernetes Service (AKS) to deploy an AKS cluster into an existing virtual network and subnet.
44
services: container-service
55
ms.topic: article
6-
ms.date: 06/02/2020
6+
ms.date: 06/02/2022
77

88
ms.reviewer: nieberts, jomore
99
---
@@ -21,7 +21,7 @@ This article shows you how to use *kubenet* networking to create and use a virtu
2121
* The virtual network for the AKS cluster must allow outbound internet connectivity.
2222
* Don't create more than one AKS cluster in the same subnet.
2323
* AKS clusters may not use `169.254.0.0/16`, `172.30.0.0/16`, `172.31.0.0/16`, or `192.0.2.0/24` for the Kubernetes service address range, pod address range or cluster virtual network address range.
24-
* The cluster identity used by the AKS cluster must have at least [Network Contributor](../role-based-access-control/built-in-roles.md#network-contributor) role on the subnet within your virtual network. You must also have the appropriate permissions, such as the subscription owner, to create a cluster identity and assign it permissions. If you wish to define a [custom role](../role-based-access-control/custom-roles.md) instead of using the built-in Network Contributor role, the following permissions are required:
24+
* The cluster identity used by the AKS cluster must have at least [Network Contributor](../role-based-access-control/built-in-roles.md#network-contributor) role on the subnet within your virtual network. CLI helps do the role assignment automatically. If you are using ARM template or other clients, the role assignment needs to be done manually. You must also have the appropriate permissions, such as the subscription owner, to create a cluster identity and assign it permissions. If you wish to define a [custom role](../role-based-access-control/custom-roles.md) instead of using the built-in Network Contributor role, the following permissions are required:
2525
* `Microsoft.Network/virtualNetworks/subnets/join/action`
2626
* `Microsoft.Network/virtualNetworks/subnets/read`
2727

@@ -138,6 +138,9 @@ The following example output shows the application ID and password for your serv
138138

139139
To assign the correct delegations in the remaining steps, use the [az network vnet show][az-network-vnet-show] and [az network vnet subnet show][az-network-vnet-subnet-show] commands to get the required resource IDs. These resource IDs are stored as variables and referenced in the remaining steps:
140140

141+
> [!NOTE]
142+
> If you are using CLI, you can skip this step. With ARM template or other clients, you need to do the below role assignment.
143+
141144
```azurecli-interactive
142145
VNET_ID=$(az network vnet show --resource-group myResourceGroup --name myAKSVnet --query id -o tsv)
143146
SUBNET_ID=$(az network vnet subnet show --resource-group myResourceGroup --vnet-name myAKSVnet --name myAKSSubnet --query id -o tsv)

0 commit comments

Comments
 (0)