You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-arc/includes/arc-region-note.md
+6-2Lines changed: 6 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ author: MikeRayMSFT
3
3
ms.author: mikeray
4
4
ms.service: azure-arc
5
5
ms.topic: include
6
-
ms.date: 12/13/2022
6
+
ms.date: 10/27/2023
7
7
---
8
8
9
9
To get the region segment of a regional endpoint, remove all spaces from the Azure region name. For example, *East US 2* region, the region name is `eastus2`.
@@ -12,6 +12,10 @@ For example: `san-af-<region>-prod.azurewebsites.net` should be `san-af-eastus2-
Copy file name to clipboardExpand all lines: articles/azure-arc/kubernetes/cluster-connect.md
+25-39Lines changed: 25 additions & 39 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: "Use cluster connect to securely connect to Azure Arc-enabled Kubernetes clusters."
3
-
ms.date: 10/12/2023
3
+
ms.date: 10/27/2023
4
4
ms.topic: how-to
5
5
ms.custom: devx-track-azurecli
6
6
description: "With cluster connect, you can securely connect to Azure Arc-enabled Kubernetes clusters from anywhere without requiring any inbound port to be enabled on the firewall."
@@ -19,9 +19,14 @@ Before you begin, review the [conceptual overview of the cluster connect feature
19
19
20
20
## Prerequisites
21
21
22
+
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
23
+
24
+
- An existing Azure Arc-enabled Kubernetes connected cluster.
25
+
- If you haven't connected a cluster yet, use our [quickstart](quickstart-connect-cluster.md).
26
+
-[Upgrade your agents](agent-upgrade.md#manually-upgrade-agents) to the latest version.
27
+
22
28
### [Azure CLI](#tab/azure-cli)
23
29
24
-
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
25
30
26
31
-[Install](/cli/azure/install-azure-cli) or [update](/cli/azure/update-azure-cli) Azure CLI to the latest version.
27
32
@@ -37,20 +42,6 @@ Before you begin, review the [conceptual overview of the cluster connect feature
37
42
az extension update --name connectedk8s
38
43
```
39
44
40
-
- An existing Azure Arc-enabled Kubernetes connected cluster.
41
-
- If you haven't connected a cluster yet, use our [quickstart](quickstart-connect-cluster.md).
42
-
-[Upgrade your agents](agent-upgrade.md#manually-upgrade-agents) to the latest version.
43
-
44
-
- In addition to meeting the [network requirements for Arc-enabled Kubernetes](network-requirements.md), enable these endpoints for outbound access:
> To translate the `*.servicebus.windows.net` wildcard into specific endpoints, use the command `\GET https://guestnotificationservice.azure.com/urls/allowlist?api-version=2020-01-01&location=<location>`. Within this command, the region must be specified for the `<location>` placeholder.
53
-
54
45
- Replace the placeholders and run the below command to set the environment variables used in this document:
55
46
56
47
```azurecli
@@ -61,24 +52,8 @@ Before you begin, review the [conceptual overview of the cluster connect feature
61
52
62
53
### [Azure PowerShell](#tab/azure-powershell)
63
54
64
-
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
65
-
66
55
- Install [Azure PowerShell version 6.6.0 or later](/powershell/azure/install-azure-powershell).
67
56
68
-
- An existing Azure Arc-enabled Kubernetes connected cluster.
69
-
- If you haven't connected a cluster yet, use our [quickstart](quickstart-connect-cluster.md).
70
-
-[Upgrade your agents](agent-upgrade.md#manually-upgrade-agents) to the latest version.
71
-
72
-
- In addition to meeting the [network requirements for Arc-enabled Kubernetes](network-requirements.md), enable these endpoints for outbound access:
> To translate the `*.servicebus.windows.net` wildcard into specific endpoints, use the command `\GET https://guestnotificationservice.azure.com/urls/allowlist?api-version=2020-01-01&location=<location>`. Within this command, the region must be specified for the `<location>` placeholder.
81
-
82
57
- Replace the placeholders and run the below command to set the environment variables used in this document:
83
58
84
59
```azurepowershell
@@ -89,6 +64,16 @@ Before you begin, review the [conceptual overview of the cluster connect feature
89
64
90
65
---
91
66
67
+
- In addition to meeting the [network requirements for Arc-enabled Kubernetes](network-requirements.md), enable these endpoints for outbound access:
> To translate the `*.servicebus.windows.net` wildcard into specific endpoints, use the command `\GET https://guestnotificationservice.azure.com/urls/allowlist?api-version=2020-01-01&location=<location>`. Within this command, the region must be specified for the `<location>` placeholder.
@@ -117,13 +102,13 @@ On the existing Arc-enabled cluster, create the ClusterRoleBinding with either M
117
102
118
103
1. Authorize the entity with appropriate permissions.
119
104
120
-
- If you are using Kubernetes native ClusterRoleBinding or RoleBinding for authorization checks on the cluster, with the `kubeconfig` file pointing to the `apiserver` of your cluster for direct access, you can create one mapped to the Microsoft Entra entity (service principal or user) that needs to access this cluster. Example:
105
+
- If you're using Kubernetes native ClusterRoleBinding or RoleBinding for authorization checks on the cluster, with the `kubeconfig` file pointing to the `apiserver` of your cluster for direct access, you can create one mapped to the Microsoft Entra entity (service principal or user) that needs to access this cluster. For example:
- If you are using Azure RBAC for authorization checks on the cluster, you can create an Azure role assignment mapped to the Microsoft Entra entity. Example:
111
+
- If you're using Azure RBAC for authorization checks on the cluster, you can create an applicable [Azure role assignment](azure-rbac.md#built-in-roles) mapped to the Microsoft Entra entity. For example:
127
112
128
113
```azurecli
129
114
az role assignment create --role "Azure Arc Kubernetes Viewer" --assignee $AAD_ENTITY_OBJECT_ID --scope $ARM_ID_CLUSTER
@@ -148,15 +133,16 @@ On the existing Arc-enabled cluster, create the ClusterRoleBinding with either M
148
133
149
134
1. Authorize the entity with appropriate permissions.
150
135
151
-
- If you are using Kubernetes native ClusterRoleBinding or RoleBinding for authorization checks on the cluster, with the `kubeconfig` file pointing to the `apiserver` of your cluster for direct access, you can create one mapped to the Microsoft Entra entity (service principal or user) that needs to access this cluster. Example:
136
+
- If you're using Kubernetes native ClusterRoleBinding or RoleBinding for authorization checks on the cluster, with the `kubeconfig` file pointing to the `apiserver` of your cluster for direct access, you can create one mapped to the Microsoft Entra entity (service principal or user) that needs to access this cluster. For example:
- If you are using [Azure RBAC for authorization checks](azure-rbac.md) on the cluster, you can create an Azure role assignment mapped to the Microsoft Entra entity. Example:
142
+
- If you're using [Azure RBAC for authorization checks](azure-rbac.md) on the cluster, you can create an applicable [Azure role assignment](azure-rbac.md#built-in-roles) mapped to the Microsoft Entra entity. For example:
158
143
159
-
```azurecli
144
+
```azurepowershell
145
+
160
146
az role assignment create --role "Azure Arc Kubernetes Viewer" --assignee $AAD_ENTITY_OBJECT_ID --scope $ARM_ID_CLUSTER
161
147
az role assignment create --role "Azure Arc Enabled Kubernetes Cluster User Role" --assignee $AAD_ENTITY_OBJECT_ID --scope $ARM_ID_CLUSTER
162
148
```
@@ -278,7 +264,7 @@ Use `az connectedk8s show` to check your Arc-enabled Kubernetes agent version.
278
264
279
265
### [Agent version < 1.11.7](#tab/agent-version)
280
266
281
-
When making requests to the Kubernetes cluster, if the Microsoft Entra entity used is a part of more than 200 groups, you may see the following error:
267
+
When making requests to the Kubernetes cluster, if the Microsoft Entra entity used is a part of more than 200 groups, you might see the following error:
282
268
283
269
`You must be logged in to the server (Error:Error while retrieving group info. Error:Overage claim (users with more than 200 group membership) is currently not supported.`
284
270
@@ -289,7 +275,7 @@ This is a known limitation. To get past this error:
289
275
290
276
### [Agent version >= 1.11.7](#tab/agent-version-latest)
291
277
292
-
When making requests to the Kubernetes cluster, if the Microsoft Entra service principal used is a part of more than 200 groups, you may see the following error:
278
+
When making requests to the Kubernetes cluster, if the Microsoft Entra service principal used is a part of more than 200 groups, you might see the following error:
293
279
294
280
`Overage claim (users with more than 200 group membership) for SPN is currently not supported. For troubleshooting, please refer to aka.ms/overageclaimtroubleshoot`
0 commit comments