Skip to content

Commit a38b4e7

Browse files
committed
tweaks
1 parent 523e8ff commit a38b4e7

File tree

1 file changed

+12
-7
lines changed

1 file changed

+12
-7
lines changed

articles/aks/use-managed-identity.md

Lines changed: 12 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.subservice: aks-security
88
ms.custom:
99
- devx-track-azurecli
1010
- ignite-2023
11-
ms.date: 06/03/2024
11+
ms.date: 06/07/2024
1212
ms.author: tamram
1313
---
1414

@@ -22,7 +22,7 @@ This article shows how to enable the following types of managed identity on a ne
2222

2323
* **System-assigned managed identity.** A system-assigned managed identity is associated with a single Azure resource, such as an AKS cluster. It exists for the lifecycle of the cluster only.
2424
* **User-assigned managed identity.** A user-assigned managed identity is a standalone Azure resource that an AKS cluster can use to authorize access to other Azure services. It persists separately from the AKS cluster and can be used by multiple Azure resources.
25-
* **Pre-created Kubelet managed identity.**
25+
* **Pre-created kubelet managed identity.** A pre-created kubelet managed identity is an optional user-assigned identity that kubelet can use to access other resources in Azure. If you don't specify a user-assigned managed identity for kubelet, AKS creates a system-assigned kubelet identity in the node resource group.
2626

2727
To learn more about managed identities, see [Managed identities for Azure resources](/entra/identity/managed-identities-azure-resources/overview).
2828

@@ -290,7 +290,7 @@ If the cluster is using a service principal, the value of the *type* property wi
290290

291291
## Use a pre-created kubelet managed identity
292292

293-
A kubelet identity enables access to the existing identity prior to cluster creation. The kubelet identity must be a user-assigned managed identity. This feature enables scenarios such as connection to ACR with a pre-created managed identity.
293+
A pre-created kubelet identity is a user-assigned managed identity that exists prior to cluster creation. This feature enables scenarios such as connection to Azure Container Registry (ACR) during cluster creation.
294294

295295
> [!NOTE]
296296
> AKS creates a user-assigned kubelet identity in the node resource group if you don't [specify your own kubelet managed identity][use-a-pre-created-kubelet-managed-identity].
@@ -354,7 +354,7 @@ az aks create \
354354
--generate-ssh-keys
355355
```
356356

357-
A successful AKS cluster creation using a kubelet managed identity should resemble the following example output:
357+
A successful AKS cluster creation using a kubelet managed identity should result in output similar to the following:
358358

359359
```output
360360
"identity": {
@@ -387,7 +387,10 @@ To update an existing cluster to use the kubelet managed identity, first get the
387387
1. Confirm your AKS cluster is using the user-assigned managed identity using the [`az aks show`][az-aks-show] command.
388388

389389
```azurecli-interactive
390-
az aks show --resource-group <RGName> --name <ClusterName> --query "servicePrincipalProfile"
390+
az aks show \
391+
--resource-group <RGName> \
392+
--name <ClusterName> \
393+
--query "servicePrincipalProfile"
391394
```
392395
393396
If your cluster is using a managed identity, the output shows `clientId` with a value of **msi**. A cluster using a service principal shows an object ID. For example:
@@ -402,7 +405,9 @@ To update an existing cluster to use the kubelet managed identity, first get the
402405
1. After confirming your cluster is using a managed identity, find the managed identity's resource ID using the [`az aks show`][az-aks-show] command.
403406
404407
```azurecli-interactive
405-
az aks show --resource-group <RGName> --name <ClusterName> --query "identity"
408+
az aks show --resource-group <RGName> \
409+
--name <ClusterName> \
410+
--query "identity"
406411
```
407412
408413
For a user-assigned managed identity, your output should look similar to the following example output:
@@ -418,7 +423,7 @@ To update an existing cluster to use the kubelet managed identity, first get the
418423
},
419424
```
420425
421-
1. Update your cluster with your existing identities using the [`az aks update`][az-aks-update] command. Make sure to provide the resource ID of the managed identity for the control plane by including the `assign-identity` argument, and the kubelet managed identity for `assign-kubelet-identity` argument.
426+
1. Update your cluster with your existing identities using the [`az aks update`][az-aks-update] command. Provide the resource ID of the user-assigned managed identity for the control plane for the `assign-identity` argument. Provide the resource ID of the kubelet managed identity for the `assign-kubelet-identity` argument.
422427
423428
```azurecli-interactive
424429
az aks update \

0 commit comments

Comments
 (0)