You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/use-managed-identity.md
+12-7Lines changed: 12 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.subservice: aks-security
8
8
ms.custom:
9
9
- devx-track-azurecli
10
10
- ignite-2023
11
-
ms.date: 06/03/2024
11
+
ms.date: 06/07/2024
12
12
ms.author: tamram
13
13
---
14
14
@@ -22,7 +22,7 @@ This article shows how to enable the following types of managed identity on a ne
22
22
23
23
***System-assigned managed identity.** A system-assigned managed identity is associated with a single Azure resource, such as an AKS cluster. It exists for the lifecycle of the cluster only.
24
24
***User-assigned managed identity.** A user-assigned managed identity is a standalone Azure resource that an AKS cluster can use to authorize access to other Azure services. It persists separately from the AKS cluster and can be used by multiple Azure resources.
25
-
***Pre-created Kubelet managed identity.**
25
+
***Pre-created kubelet managed identity.** A pre-created kubelet managed identity is an optional user-assigned identity that kubelet can use to access other resources in Azure. If you don't specify a user-assigned managed identity for kubelet, AKS creates a system-assigned kubelet identity in the node resource group.
26
26
27
27
To learn more about managed identities, see [Managed identities for Azure resources](/entra/identity/managed-identities-azure-resources/overview).
28
28
@@ -290,7 +290,7 @@ If the cluster is using a service principal, the value of the *type* property wi
290
290
291
291
## Use a pre-created kubelet managed identity
292
292
293
-
A kubelet identity enables access to the existing identity prior to cluster creation. The kubelet identity must be a user-assigned managed identity. This feature enables scenarios such as connection to ACR with a pre-created managed identity.
293
+
A pre-created kubelet identity is a user-assigned managed identity that exists prior to cluster creation. This feature enables scenarios such as connection to Azure Container Registry (ACR) during cluster creation.
294
294
295
295
> [!NOTE]
296
296
> AKS creates a user-assigned kubelet identity in the node resource group if you don't [specify your own kubelet managed identity][use-a-pre-created-kubelet-managed-identity].
@@ -354,7 +354,7 @@ az aks create \
354
354
--generate-ssh-keys
355
355
```
356
356
357
-
A successful AKS cluster creation using a kubelet managed identity should resemble the following example output:
357
+
A successful AKS cluster creation using a kubelet managed identity should result in output similar to the following:
358
358
359
359
```output
360
360
"identity": {
@@ -387,7 +387,10 @@ To update an existing cluster to use the kubelet managed identity, first get the
387
387
1. Confirm your AKS cluster is using the user-assigned managed identity using the [`az aks show`][az-aks-show] command.
388
388
389
389
```azurecli-interactive
390
-
az aks show --resource-group <RGName> --name <ClusterName> --query "servicePrincipalProfile"
390
+
az aks show \
391
+
--resource-group <RGName> \
392
+
--name <ClusterName> \
393
+
--query "servicePrincipalProfile"
391
394
```
392
395
393
396
If your cluster is using a managed identity, the output shows `clientId` with a value of **msi**. A cluster using a service principal shows an object ID. For example:
@@ -402,7 +405,9 @@ To update an existing cluster to use the kubelet managed identity, first get the
402
405
1. After confirming your cluster is using a managed identity, find the managed identity's resource ID using the [`az aks show`][az-aks-show] command.
403
406
404
407
```azurecli-interactive
405
-
az aks show --resource-group <RGName> --name <ClusterName> --query "identity"
408
+
az aks show --resource-group <RGName> \
409
+
--name <ClusterName> \
410
+
--query "identity"
406
411
```
407
412
408
413
For a user-assigned managed identity, your output should look similar to the following example output:
@@ -418,7 +423,7 @@ To update an existing cluster to use the kubelet managed identity, first get the
418
423
},
419
424
```
420
425
421
-
1. Update your cluster with your existing identities using the [`az aks update`][az-aks-update] command. Make sure to provide the resource ID of the managed identity for the control plane by including the `assign-identity` argument, and the kubelet managed identity for `assign-kubelet-identity` argument.
426
+
1. Update your cluster with your existing identities using the [`az aks update`][az-aks-update] command. Provide the resource ID of the user-assigned managed identity for the control plane for the `assign-identity` argument. Provide the resource ID of the kubelet managed identity for the `assign-kubelet-identity` argument.
0 commit comments