You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -130,7 +133,7 @@ az aks show -g <RGName> -n <ClusterName> --query "identity"
130
133
```
131
134
132
135
> [!NOTE]
133
-
> For creating and using your own VNet, static IP address, or attached Azure disk where the resources are outside of the worker node resource group, CLI will perform the role assignement automatically. If you are using ARM template or other platforms, you need to use the PrincipalID of the cluster System Assigned Managed Identity to perform a role assignment. For more information on role assignment, see [Delegate access to other Azure resources](kubernetes-service-principal.md#delegate-access-to-other-azure-resources).
136
+
> For creating and using your own VNet, static IP address, or attached Azure disk where the resources are outside of the worker node resource group, CLI will add the role assignement automatically. If you are using ARM template or other clients, you need to use the PrincipalID of the cluster System Assigned Managed Identity to perform a role assignment. For more information on role assignment, see [Delegate access to other Azure resources](kubernetes-service-principal.md#delegate-access-to-other-azure-resources).
134
137
>
135
138
> Permission grants to cluster Managed Identity used by Azure Cloud provider may take up 60 minutes to populate.
136
139
@@ -140,9 +143,6 @@ A custom control plane identity enables access to be granted to the existing ide
140
143
141
144
You must have the Azure CLI, version 2.15.1 or later installed.
142
145
143
-
> [!NOTE]
144
-
> AKS will create a kubelet MI in the Node resource group if you do not BYO kubelet MI.
145
-
146
146
### Limitations
147
147
* USDOD Central, USDOD East, USGov Iowa in Azure Government aren't currently supported.
148
148
@@ -198,8 +198,7 @@ A Kubelet identity enables access to be granted to the existing identity prior t
198
198
199
199
200
200
> [!NOTE]
201
-
> For BYO kubelet MI, only CLI integrates role assignment for control plane MI. If you are using ARM template or other platforms, you need to excute `az role assignment create --assignee <id> --role "Managed Identity Operator" --scope <id>` to assign "Managed Identity Operator" role to the identity
202
-
201
+
> For BYO kubelet MI,Azure CLI will automatically add required role assignment for control plane MI. If you are using ARM template or other clients, you need to create the role assignment manually. It can be done using CLI command 'az role assignment create --assignee <control-plane-identity-object-id> --role "Managed Identity Operator" --scope <kubelet-identity-resource-id>'
203
202
204
203
### Prerequisites
205
204
@@ -266,7 +265,7 @@ az identity list --query "[].{Name:name, Id:id, Location:location}" -o table
266
265
267
266
### Create a cluster using kubelet identity
268
267
269
-
Now you can use the following command to create your cluster with your existing identities. Provide the control plane identity id via `assign-identity` and the kubelet managed identity via `assign-kubelet-identity`:
268
+
Now you can use the following command to create your cluster with your existing identities. Provide the control plane identity resource ID via `assign-identity` and the kubelet managed identity via `assign-kubelet-identity`:
A successful cluster creation using your own kubelet managed identity contains the following output:
@@ -320,15 +319,15 @@ az upgrade
320
319
```
321
320
#### Updating your cluster with kubelet identity
322
321
323
-
Now you can use the following command to update your cluster with your existing identities. Provide the control plane identity id via `assign-identity` and the kubelet managed identity via `assign-kubelet-identity`:
322
+
Now you can use the following command to update your cluster with your existing identities. Provide the control plane identity resource ID via `assign-identity` and the kubelet managed identity via `assign-kubelet-identity`:
0 commit comments