You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/containers/container-insights-enable-existing-clusters.md
+19-8Lines changed: 19 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -406,35 +406,46 @@ After a few minutes, the command completes and returns JSON-formatted informatio
406
406
### Existing clusters with service principal
407
407
AKS Clusters with service principal must first disable monitoring and then upgrade to managed identity. Only Azure public cloud, Azure China cloud, and Azure Government cloud are currently supported for this migration.
408
408
409
+
1. Get the configured Log Analytics workspace resource id:
409
410
410
-
1. Disable monitoring with the following command:
411
+
```cli
412
+
az aks show -g <resource-group-name> -n <cluster-name> | grep -i "logAnalyticsWorkspaceResourceID"
413
+
```
414
+
415
+
2. Disable monitoring with the following command:
411
416
412
417
```cli
413
418
az aks disable-addons -a monitoring -g <resource-group-name> -n <cluster-name> --workspace-resource-id <workspace-resource-id>
414
419
```
415
420
416
-
2. Upgrade cluster to system managed identity with the following command:
421
+
3. Upgrade cluster to system managed identity with the following command:
417
422
418
423
```cli
419
424
az aks update -g <resource-group-name> -n <cluster-name> --enable-managed-identity --workspace-resource-id <workspace-resource-id>
420
425
```
421
426
422
-
3. Enable Monitoring addon with managed identity authentication with the following command:
427
+
4. Enable Monitoring addon with managed identity authentication option using Log Analytics workspace resource ID obtained in the first step:
423
428
424
429
```cli
425
430
az aks enable-addons -a monitoring --enable-msi-auth-for-monitoring -g <resource-group-name> -n <cluster-name> --workspace-resource-id <workspace-resource-id>
426
431
```
427
432
428
-
### Existing clusters with system assigned identity
429
-
AKS Clusters with system assigned identity must first disable monitoring and then upgrade to managed identity. Only Azure public cloud, Azure China cloud, and Azure Government cloud are currently supported for this migration.
433
+
### Existing clusters with system or user assigned identity
434
+
AKS Clusters with system assigned identity must first disable monitoring and then upgrade to managed identity. Only Azure public cloud, Azure China cloud, and Azure Government cloud are currently supported for clusters with system identity. For clusters with user assigned identity, only Azure Public cloud is supported.
430
435
431
-
1. Disable monitoring with the following command:
436
+
1. Get the configured Log Analytics workspace resource id:
432
437
433
438
```cli
434
-
az aks disable-addons -a monitoring -g <resource-group-name> -n <cluster-name> --workspace-resource-id <workspace-resource-id>
439
+
az aks show -g <resource-group-name> -n <cluster-name> | grep -i "logAnalyticsWorkspaceResourceID"
440
+
```
441
+
442
+
2. Disable monitoring with the following command:
443
+
444
+
```cli
445
+
az aks disable-addons -a monitoring -g <resource-group-name> -n <cluster-name>
435
446
```
436
447
437
-
2. Enable Monitoring addon with Managed Identity Auth Option
448
+
3. Enable Monitoring addon with managed identity authentication option using Log Analytics workspace resource ID obtained in the first step:
438
449
439
450
```cli
440
451
az aks enable-addons -a monitoring --enable-msi-auth-for-monitoring -g <resource-group-name> -n <cluster-name> --workspace-resource-id <workspace-resource-id>
0 commit comments