Skip to content

Commit bb3ce89

Browse files
authored
Update use-managed-identity.md
1 parent 27982df commit bb3ce89

File tree

1 file changed

+11
-12
lines changed

1 file changed

+11
-12
lines changed

articles/aks/use-managed-identity.md

Lines changed: 11 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,9 @@ You must have the following resource installed:
1717

1818
- The Azure CLI, version 2.23.0 or later
1919

20+
> [!NOTE]
21+
> AKS will create a kubelet MI in the Node resource group if you do not BYO kubelet MI.
22+
2023
## Limitations
2124

2225
* Tenants move / migrate of managed identity enabled clusters isn't supported.
@@ -130,7 +133,7 @@ az aks show -g <RGName> -n <ClusterName> --query "identity"
130133
```
131134

132135
> [!NOTE]
133-
> For creating and using your own VNet, static IP address, or attached Azure disk where the resources are outside of the worker node resource group, CLI will perform the role assignement automatically. If you are using ARM template or other platforms, you need to use the PrincipalID of the cluster System Assigned Managed Identity to perform a role assignment. For more information on role assignment, see [Delegate access to other Azure resources](kubernetes-service-principal.md#delegate-access-to-other-azure-resources).
136+
> For creating and using your own VNet, static IP address, or attached Azure disk where the resources are outside of the worker node resource group, CLI will add the role assignement automatically. If you are using ARM template or other clients, you need to use the PrincipalID of the cluster System Assigned Managed Identity to perform a role assignment. For more information on role assignment, see [Delegate access to other Azure resources](kubernetes-service-principal.md#delegate-access-to-other-azure-resources).
134137
>
135138
> Permission grants to cluster Managed Identity used by Azure Cloud provider may take up 60 minutes to populate.
136139
@@ -140,9 +143,6 @@ A custom control plane identity enables access to be granted to the existing ide
140143

141144
You must have the Azure CLI, version 2.15.1 or later installed.
142145

143-
> [!NOTE]
144-
> AKS will create a kubelet MI in the Node resource group if you do not BYO kubelet MI.
145-
146146
### Limitations
147147
* USDOD Central, USDOD East, USGov Iowa in Azure Government aren't currently supported.
148148

@@ -198,8 +198,7 @@ A Kubelet identity enables access to be granted to the existing identity prior t
198198
199199

200200
> [!NOTE]
201-
> For BYO kubelet MI, only CLI integrates role assignment for control plane MI. If you are using ARM template or other platforms, you need to excute `az role assignment create --assignee <id> --role "Managed Identity Operator" --scope <id>` to assign "Managed Identity Operator" role to the identity
202-
201+
> For BYO kubelet MI,Azure CLI will automatically add required role assignment for control plane MI. If you are using ARM template or other clients, you need to create the role assignment manually. It can be done using CLI command 'az role assignment create --assignee <control-plane-identity-object-id> --role "Managed Identity Operator" --scope <kubelet-identity-resource-id>'
203202
204203
### Prerequisites
205204

@@ -266,7 +265,7 @@ az identity list --query "[].{Name:name, Id:id, Location:location}" -o table
266265

267266
### Create a cluster using kubelet identity
268267

269-
Now you can use the following command to create your cluster with your existing identities. Provide the control plane identity id via `assign-identity` and the kubelet managed identity via `assign-kubelet-identity`:
268+
Now you can use the following command to create your cluster with your existing identities. Provide the control plane identity resource ID via `assign-identity` and the kubelet managed identity via `assign-kubelet-identity`:
270269

271270
```azurecli-interactive
272271
az aks create \
@@ -278,8 +277,8 @@ az aks create \
278277
--dns-service-ip 10.2.0.10 \
279278
--service-cidr 10.2.0.0/24 \
280279
--enable-managed-identity \
281-
--assign-identity <identity-id> \
282-
--assign-kubelet-identity <kubelet-identity-id>
280+
--assign-identity <identity-resource-id> \
281+
--assign-kubelet-identity <kubelet-identity-resource-id>
283282
```
284283

285284
A successful cluster creation using your own kubelet managed identity contains the following output:
@@ -320,15 +319,15 @@ az upgrade
320319
```
321320
#### Updating your cluster with kubelet identity
322321

323-
Now you can use the following command to update your cluster with your existing identities. Provide the control plane identity id via `assign-identity` and the kubelet managed identity via `assign-kubelet-identity`:
322+
Now you can use the following command to update your cluster with your existing identities. Provide the control plane identity resource ID via `assign-identity` and the kubelet managed identity via `assign-kubelet-identity`:
324323

325324
```azurecli-interactive
326325
az aks update \
327326
--resource-group myResourceGroup \
328327
--name myManagedCluster \
329328
--enable-managed-identity \
330-
--assign-identity <identity-id> \
331-
--assign-kubelet-identity <kubelet-identity-id>
329+
--assign-identity <identity-resource-id> \
330+
--assign-kubelet-identity <kubelet-identity-resource-id>
332331
```
333332

334333
A successful cluster update using your own kubelet managed identity contains the following output:

0 commit comments

Comments
 (0)