You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/use-managed-identity.md
+13-29Lines changed: 13 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Use managed identities in Azure Kubernetes Service
3
3
description: Learn how to use managed identities in Azure Kubernetes Service (AKS)
4
4
ms.topic: article
5
-
ms.date: 01/25/2022
5
+
ms.date: 06/01/2022
6
6
---
7
7
8
8
# Use managed identities in Azure Kubernetes Service
@@ -130,16 +130,19 @@ az aks show -g <RGName> -n <ClusterName> --query "identity"
130
130
```
131
131
132
132
> [!NOTE]
133
-
> For creating and using your own VNet, static IP address, or attached Azure disk where the resources are outside of the worker node resource group, use the PrincipalID of the cluster System Assigned Managed Identity to perform a role assignment. For more information on role assignment, see [Delegate access to other Azure resources](kubernetes-service-principal.md#delegate-access-to-other-azure-resources).
133
+
> For creating and using your own VNet, static IP address, or attached Azure disk where the resources are outside of the worker node resource group, CLI will perform the role assignement automatically. If you are using ARM template or other platforms, you need to use the PrincipalID of the cluster System Assigned Managed Identity to perform a role assignment. For more information on role assignment, see [Delegate access to other Azure resources](kubernetes-service-principal.md#delegate-access-to-other-azure-resources).
134
134
>
135
135
> Permission grants to cluster Managed Identity used by Azure Cloud provider may take up 60 minutes to populate.
136
136
137
137
138
-
## Bring your own control plane MI
138
+
## Bring your own (BYO) control plane MI
139
139
A custom control plane identity enables access to be granted to the existing identity prior to cluster creation. This feature enables scenarios such as using a custom VNET or outboundType of UDR with a pre-created managed identity.
140
140
141
141
You must have the Azure CLI, version 2.15.1 or later installed.
142
142
143
+
> [!NOTE]
144
+
> AKS will create a kubelet MI in the Node resource group if you do not BYO kubelet MI.
145
+
143
146
### Limitations
144
147
* USDOD Central, USDOD East, USGov Iowa in Azure Government aren't currently supported.
145
148
@@ -149,31 +152,6 @@ If you don't have a managed identity yet, you should go ahead and create one for
149
152
az identity create --name myIdentity --resource-group myResourceGroup
150
153
```
151
154
152
-
Assign "Managed Identity Operator" role to the identity.
153
-
154
-
```azurecli-interactive
155
-
az role assignment create --assignee <id> --role "Managed Identity Operator" --scope <id>
If your managed identity is part of your subscription, you can use [az identity CLI command][az-identity-list] to query it.
178
156
179
157
```azurecli-interactive
@@ -211,13 +189,18 @@ A successful cluster creation using your own managed identities contains this us
211
189
},
212
190
```
213
191
214
-
## Bring your own kubelet MI
192
+
## Bring your own (BYO) kubelet MI
215
193
216
194
A Kubelet identity enables access to be granted to the existing identity prior to cluster creation. This feature enables scenarios such as connection to ACR with a pre-created managed identity.
217
195
218
196
> [!WARNING]
219
197
> Updating kubelet MI will upgrade Nodepool, which causes downtime for your AKS cluster as the nodes in the nodepools will be cordoned/drained and then reimaged.
220
198
199
+
200
+
> [!NOTE]
201
+
> For BYO kubelet MI, only CLI integrates role assignment for control plane MI. If you are using ARM template or other platforms, you need to excute `az role assignment create --assignee <id> --role "Managed Identity Operator" --scope <id>` to assign "Managed Identity Operator" role to the identity
202
+
203
+
221
204
### Prerequisites
222
205
223
206
- You must have the Azure CLI, version 2.26.0 or later installed.
@@ -252,6 +235,7 @@ The result should look like:
252
235
}
253
236
```
254
237
238
+
255
239
If you don't have a kubelet managed identity yet, you should go ahead and create one. The following example uses the [az identity create][az-identity-create] command:
0 commit comments