Skip to content

Commit ee4bce2

Browse files
authored
Merge pull request #249839 from JnHs/jh-arck8-113811
fixes MicrosoftDocs/azure-docs#113811
2 parents 14b830e + 4ac8947 commit ee4bce2

File tree

1 file changed

+7
-6
lines changed

1 file changed

+7
-6
lines changed

articles/azure-arc/kubernetes/cluster-connect.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: "Use cluster connect to securely connect to Azure Arc-enabled Kubernetes clusters."
3-
ms.date: 04/20/2023
3+
ms.date: 08/30/2023
44
ms.topic: how-to
55
ms.custom: devx-track-azurecli
66
description: "With cluster connect, you can securely connect to Azure Arc-enabled Kubernetes clusters without requiring any inbound port to be enabled on the firewall."
@@ -100,7 +100,7 @@ Before you begin, review the [conceptual overview of the cluster connect feature
100100
- For an Azure AD user account:
101101

102102
```azurecli
103-
AAD_ENTITY_OBJECT_ID=$(az ad signed-in-user show --query userPrincipalName -o tsv)
103+
AAD_ENTITY_OBJECT_ID=$(az ad signed-in-user show --query id -o tsv)
104104
```
105105
106106
- For an Azure AD application:
@@ -148,7 +148,7 @@ Before you begin, review the [conceptual overview of the cluster connect feature
148148
kubectl create clusterrolebinding demo-user-binding --clusterrole cluster-admin --user=$AAD_ENTITY_OBJECT_ID
149149
```
150150
151-
- If you are using Azure RBAC for authorization checks on the cluster, you can create an Azure role assignment mapped to the Azure AD entity. Example:
151+
- If you are using [Azure RBAC for authorization checks](azure-rbac.md) on the cluster, you can create an Azure role assignment mapped to the Azure AD entity. Example:
152152
153153
```azurecli
154154
az role assignment create --role "Azure Arc Kubernetes Viewer" --assignee $AAD_ENTITY_OBJECT_ID --scope $ARM_ID_CLUSTER
@@ -259,14 +259,13 @@ Before you begin, review the [conceptual overview of the cluster connect feature
259259
You should now see a response from the cluster containing the list of all pods under the `default` namespace.
260260

261261
## Known limitations
262-
Use `az connectedk8s show` to check the Arc-enabled Kubernetes agent version.
263262

264-
### [Agent version < 1.11.7](#tab/agent-version)
263+
Use `az connectedk8s show` to check your Arc-enabled Kubernetes agent version.
265264

265+
### [Agent version < 1.11.7](#tab/agent-version)
266266

267267
When making requests to the Kubernetes cluster, if the Azure AD entity used is a part of more than 200 groups, you may see the following error:
268268

269-
270269
`You must be logged in to the server (Error:Error while retrieving group info. Error:Overage claim (users with more than 200 group membership) is currently not supported.`
271270

272271
This is a known limitation. To get past this error:
@@ -275,6 +274,7 @@ This is a known limitation. To get past this error:
275274
1. [Sign in](/cli/azure/create-an-azure-service-principal-azure-cli#sign-in-using-a-service-principal) to Azure CLI with the service principal before running the `az connectedk8s proxy` command.
276275

277276
### [Agent version >= 1.11.7](#tab/agent-version-latest)
277+
278278
When making requests to the Kubernetes cluster, if the Azure AD service principal used is a part of more than 200 groups, you may see the following error:
279279

280280
`Overage claim (users with more than 200 group membership) for SPN is currently not supported. For troubleshooting, please refer to aka.ms/overageclaimtroubleshoot`
@@ -283,6 +283,7 @@ This is a known limitation. To get past this error:
283283

284284
1. Create a [service principal](/cli/azure/create-an-azure-service-principal-azure-cli), which is less likely to be a member of more than 200 groups.
285285
1. [Sign in](/cli/azure/create-an-azure-service-principal-azure-cli#sign-in-using-a-service-principal) to Azure CLI with the service principal before running the `az connectedk8s proxy` command.
286+
286287
---
287288

288289
## Next steps

0 commit comments

Comments
 (0)