Skip to content

Commit d2f74fd

Browse files
authored
Merge pull request #267869 from nathaniel-msft/aks-tutorial-3-patch
AKS Tutorial 3: Continuity
2 parents 6042622 + 9a3739b commit d2f74fd

File tree

1 file changed

+50
-50
lines changed

1 file changed

+50
-50
lines changed

articles/aks/tutorial-kubernetes-deploy-cluster.md

Lines changed: 50 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -82,6 +82,56 @@ AZD Environments in a codespace automatically download all dependencies found in
8282
8383
---
8484
85+
## Create an AKS cluster
86+
87+
AKS clusters can use [Kubernetes role-based access control (Kubernetes RBAC)][k8s-rbac], which allows you to define access to resources based on roles assigned to users. Permissions are combined when users are assigned multiple roles. Permissions can be scoped to either a single namespace or across the whole cluster. For more information, see [Control access to cluster resources using Kubernetes RBAC and Microsoft Entra ID in AKS][aks-k8s-rbac].
88+
89+
For information about AKS resource limits and region availability, see [Quotas, virtual machine size restrictions, and region availability in AKS][quotas-skus-regions].
90+
91+
> [!NOTE]
92+
> To ensure your cluster operates reliably, you should run at least two nodes.
93+
94+
### [Azure CLI](#tab/azure-cli)
95+
96+
To allow an AKS cluster to interact with other Azure resources, the Azure platform automatically creates a cluster identity. In this example, the cluster identity is [granted the right to pull images][container-registry-integration] from the ACR instance you created in the previous tutorial. To execute the command successfully, you need to have an **Owner** or **Azure account administrator** role in your Azure subscription.
97+
98+
* Create an AKS cluster using the [`az aks create`][az aks create] command. The following example creates a cluster named *myAKSCluster* in the resource group named *myResourceGroup*. This resource group was created in the [previous tutorial][aks-tutorial-prepare-acr] in the *eastus* region.
99+
100+
```azurecli-interactive
101+
az aks create \
102+
--resource-group myResourceGroup \
103+
--name myAKSCluster \
104+
--node-count 2 \
105+
--generate-ssh-keys \
106+
--attach-acr <acrName>
107+
```
108+
109+
> [!NOTE]
110+
> If you already generated SSH keys, you may encounter an error similar to `linuxProfile.ssh.publicKeys.keyData is invalid`. To proceed, retry the command without the `--generate-ssh-keys` parameter.
111+
112+
To avoid needing an **Owner** or **Azure account administrator** role, you can also manually configure a service principal to pull images from ACR. For more information, see [ACR authentication with service principals](../container-registry/container-registry-auth-service-principal.md) or [Authenticate from Kubernetes with a pull secret](../container-registry/container-registry-auth-kubernetes.md). Alternatively, you can use a [managed identity](use-managed-identity.md) instead of a service principal for easier management.
113+
114+
### [Azure PowerShell](#tab/azure-powershell)
115+
116+
To allow an AKS cluster to interact with other Azure resources, the Azure platform automatically creates a cluster identity. In this example, the cluster identity is [granted the right to pull images][container-registry-integration] from the ACR instance you created in the previous tutorial. To execute the command successfully, you need to have an **Owner** or **Azure account administrator** role in your Azure subscription.
117+
118+
* Create an AKS cluster using the [`New-AzAksCluster`][new-azakscluster] cmdlet. The following example creates a cluster named *myAKSCluster* in the resource group named *myResourceGroup*. This resource group was created in the [previous tutorial][aks-tutorial-prepare-acr] in the *eastus* region.
119+
120+
```azurepowershell-interactive
121+
New-AzAksCluster -ResourceGroupName myResourceGroup -Name myAKSCluster -NodeCount 2 -GenerateSshKey -AcrNameToAttach <acrName>
122+
```
123+
124+
> [!NOTE]
125+
> If you already generated SSH keys, you may encounter an error similar to `linuxProfile.ssh.publicKeys.keyData is invalid`. To proceed, retry the command without the `-GenerateSshKey` parameter.
126+
127+
To avoid needing an **Owner** or **Azure account administrator** role, you can also manually configure a service principal to pull images from ACR. For more information, see [ACR authentication with service principals](../container-registry/container-registry-auth-service-principal.md) or [Authenticate from Kubernetes with a pull secret](../container-registry/container-registry-auth-kubernetes.md). Alternatively, you can use a [managed identity](use-managed-identity.md) instead of a service principal for easier management.
128+
129+
### [Azure Developer CLI](#tab/azure-azd)
130+
131+
AZD packages the deployment of clusters with the application itself using `azd up`. This command is covered in the next tutorial.
132+
133+
---
134+
85135
## Connect to cluster using kubectl
86136
87137
### [Azure CLI](#tab/azure-cli)
@@ -158,56 +208,6 @@ Sign in to your Azure Account through AZD configures your credentials.
158208
159209
---
160210
161-
## Create an AKS cluster
162-
163-
AKS clusters can use [Kubernetes role-based access control (Kubernetes RBAC)][k8s-rbac], which allows you to define access to resources based on roles assigned to users. Permissions are combined when users are assigned multiple roles. Permissions can be scoped to either a single namespace or across the whole cluster. For more information, see [Control access to cluster resources using Kubernetes RBAC and Microsoft Entra ID in AKS][aks-k8s-rbac].
164-
165-
For information about AKS resource limits and region availability, see [Quotas, virtual machine size restrictions, and region availability in AKS][quotas-skus-regions].
166-
167-
> [!NOTE]
168-
> To ensure your cluster operates reliably, you should run at least two nodes.
169-
170-
### [Azure CLI](#tab/azure-cli)
171-
172-
To allow an AKS cluster to interact with other Azure resources, the Azure platform automatically creates a cluster identity. In this example, the cluster identity is [granted the right to pull images][container-registry-integration] from the ACR instance you created in the previous tutorial. To execute the command successfully, you need to have an **Owner** or **Azure account administrator** role in your Azure subscription.
173-
174-
* Create an AKS cluster using the [`az aks create`][az aks create] command. The following example creates a cluster named *myAKSCluster* in the resource group named *myResourceGroup*. This resource group was created in the [previous tutorial][aks-tutorial-prepare-acr] in the *eastus* region.
175-
176-
```azurecli-interactive
177-
az aks create \
178-
--resource-group myResourceGroup \
179-
--name myAKSCluster \
180-
--node-count 2 \
181-
--generate-ssh-keys \
182-
--attach-acr <acrName>
183-
```
184-
185-
> [!NOTE]
186-
> If you already generated SSH keys, you may encounter an error similar to `linuxProfile.ssh.publicKeys.keyData is invalid`. To proceed, retry the command without the `--generate-ssh-keys` parameter.
187-
188-
To avoid needing an **Owner** or **Azure account administrator** role, you can also manually configure a service principal to pull images from ACR. For more information, see [ACR authentication with service principals](../container-registry/container-registry-auth-service-principal.md) or [Authenticate from Kubernetes with a pull secret](../container-registry/container-registry-auth-kubernetes.md). Alternatively, you can use a [managed identity](use-managed-identity.md) instead of a service principal for easier management.
189-
190-
### [Azure PowerShell](#tab/azure-powershell)
191-
192-
To allow an AKS cluster to interact with other Azure resources, the Azure platform automatically creates a cluster identity. In this example, the cluster identity is [granted the right to pull images][container-registry-integration] from the ACR instance you created in the previous tutorial. To execute the command successfully, you need to have an **Owner** or **Azure account administrator** role in your Azure subscription.
193-
194-
* Create an AKS cluster using the [`New-AzAksCluster`][new-azakscluster] cmdlet. The following example creates a cluster named *myAKSCluster* in the resource group named *myResourceGroup*. This resource group was created in the [previous tutorial][aks-tutorial-prepare-acr] in the *eastus* region.
195-
196-
```azurepowershell-interactive
197-
New-AzAksCluster -ResourceGroupName myResourceGroup -Name myAKSCluster -NodeCount 2 -GenerateSshKey -AcrNameToAttach <acrName>
198-
```
199-
200-
> [!NOTE]
201-
> If you already generated SSH keys, you may encounter an error similar to `linuxProfile.ssh.publicKeys.keyData is invalid`. To proceed, retry the command without the `-GenerateSshKey` parameter.
202-
203-
To avoid needing an **Owner** or **Azure account administrator** role, you can also manually configure a service principal to pull images from ACR. For more information, see [ACR authentication with service principals](../container-registry/container-registry-auth-service-principal.md) or [Authenticate from Kubernetes with a pull secret](../container-registry/container-registry-auth-kubernetes.md). Alternatively, you can use a [managed identity](use-managed-identity.md) instead of a service principal for easier management.
204-
205-
### [Azure Developer CLI](#tab/azure-azd)
206-
207-
AZD packages the deployment of clusters with the application itself using `azd up`. This command is covered in the next tutorial.
208-
209-
---
210-
211211
## Next steps
212212
213213
In this tutorial, you deployed a Kubernetes cluster in AKS and configured `kubectl` to connect to the cluster. You learned how to:

0 commit comments

Comments
 (0)