You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-arc/kubernetes/cluster-connect.md
+7-6Lines changed: 7 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: "Use cluster connect to securely connect to Azure Arc-enabled Kubernetes clusters."
3
-
ms.date: 04/20/2023
3
+
ms.date: 08/30/2023
4
4
ms.topic: how-to
5
5
ms.custom: devx-track-azurecli
6
6
description: "With cluster connect, you can securely connect to Azure Arc-enabled Kubernetes clusters without requiring any inbound port to be enabled on the firewall."
@@ -100,7 +100,7 @@ Before you begin, review the [conceptual overview of the cluster connect feature
100
100
- For an Azure AD user account:
101
101
102
102
```azurecli
103
-
AAD_ENTITY_OBJECT_ID=$(az ad signed-in-user show --query userPrincipalName -o tsv)
103
+
AAD_ENTITY_OBJECT_ID=$(az ad signed-in-user show --query id -o tsv)
104
104
```
105
105
106
106
- For an Azure AD application:
@@ -148,7 +148,7 @@ Before you begin, review the [conceptual overview of the cluster connect feature
- If you are using Azure RBAC for authorization checks on the cluster, you can create an Azure role assignment mapped to the Azure AD entity. Example:
151
+
- If you are using [Azure RBAC for authorization checks](azure-rbac.md) on the cluster, you can create an Azure role assignment mapped to the Azure AD entity. Example:
152
152
153
153
```azurecli
154
154
az role assignment create --role "Azure Arc Kubernetes Viewer" --assignee $AAD_ENTITY_OBJECT_ID --scope $ARM_ID_CLUSTER
@@ -259,14 +259,13 @@ Before you begin, review the [conceptual overview of the cluster connect feature
259
259
You should now see a response from the cluster containing the list of all pods under the `default` namespace.
260
260
261
261
## Known limitations
262
-
Use `az connectedk8s show` to check the Arc-enabled Kubernetes agent version.
263
262
264
-
### [Agent version < 1.11.7](#tab/agent-version)
263
+
Use `az connectedk8s show` to check your Arc-enabled Kubernetes agent version.
265
264
265
+
### [Agent version < 1.11.7](#tab/agent-version)
266
266
267
267
When making requests to the Kubernetes cluster, if the Azure AD entity used is a part of more than 200 groups, you may see the following error:
268
268
269
-
270
269
`You must be logged in to the server (Error:Error while retrieving group info. Error:Overage claim (users with more than 200 group membership) is currently not supported.`
271
270
272
271
This is a known limitation. To get past this error:
@@ -275,6 +274,7 @@ This is a known limitation. To get past this error:
275
274
1.[Sign in](/cli/azure/create-an-azure-service-principal-azure-cli#sign-in-using-a-service-principal) to Azure CLI with the service principal before running the `az connectedk8s proxy` command.
276
275
277
276
### [Agent version >= 1.11.7](#tab/agent-version-latest)
277
+
278
278
When making requests to the Kubernetes cluster, if the Azure AD service principal used is a part of more than 200 groups, you may see the following error:
279
279
280
280
`Overage claim (users with more than 200 group membership) for SPN is currently not supported. For troubleshooting, please refer to aka.ms/overageclaimtroubleshoot`
@@ -283,6 +283,7 @@ This is a known limitation. To get past this error:
283
283
284
284
1. Create a [service principal](/cli/azure/create-an-azure-service-principal-azure-cli), which is less likely to be a member of more than 200 groups.
285
285
1.[Sign in](/cli/azure/create-an-azure-service-principal-azure-cli#sign-in-using-a-service-principal) to Azure CLI with the service principal before running the `az connectedk8s proxy` command.
0 commit comments