Skip to content

Commit 8002ca1

Browse files
Merge pull request #18284 from MicrosoftDocs/main
Merged by Learn.Build PR Management system
2 parents 75779f4 + ec0b592 commit 8002ca1

File tree

5 files changed

+70
-31
lines changed

5 files changed

+70
-31
lines changed

AKS-Arc/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@
4747
- name: Quickstarts
4848
items:
4949
- name: Jumpstart HCIBox (external link)
50-
href: https://arcjumpstart.com/azure_jumpstart_hcibox/getting_started
50+
href: https://jumpstart.azure.com/azure_arc_jumpstart
5151
- name: How-to
5252
items:
5353
- name: Create Kubernetes clusters
@@ -189,6 +189,8 @@
189189
href: network-validation-errors.md
190190
- name: Network validation error due to .local domain
191191
href: network-validation-error-local.md
192+
- name: Entra authentication prompts when running kubectl
193+
href: entra-prompts.md
192194
- name: BGP with FRR not working
193195
href: connectivity-troubleshoot.md
194196
- name: Reference

AKS-Arc/entra-prompts.md

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
---
2+
title: Entra authentication prompts when running kubectl with Kubernetes RBAC
3+
description: Learn how to troubleshoot Entra authentication issues when using kubectl with Kubernetes RBAC.
4+
author: sethmanheim
5+
ms.author: sethm
6+
ms.topic: troubleshooting
7+
ms.date: 06/24/2025
8+
ms.reviewer: leslielin
9+
ms.lastreviewed: 06/24/2025
10+
11+
---
12+
13+
# Repeated Entra authentication prompts when running kubectl with Kubernetes RBAC
14+
15+
This article helps you diagnose and resolve issues related to repeated Entra authentication prompts when using **kubectl** with Kubernetes RBAC on AKS enabled by Azure Arc.
16+
17+
## Symptoms
18+
19+
When you use **kubectl** with [Microsoft Entra authentication and Kubernetes RBAC](kubernetes-rbac-local.md) in AKS on Azure Local, Entra authentication prompts appear after each command execution.
20+
21+
## Possible causes
22+
23+
This issue is caused by [a GitHub bug](https://github.com/Azure/kubelogin/issues/654) introduced in **kubelogin** version 0.2.0 and later.
24+
25+
## Mitigation
26+
27+
To mitigate this issue, you can use one of the following two methods:
28+
29+
- Downgrade **kubelogin** to version 1.9.0. This stable version does not have the bug that causes repeated authentication prompts. You can [download this version from the GitHub repository](https://github.com/int128/kubelogin/releases/tag/v1.9.0). Select the appropriate asset for your OS or architecture, extract it, and replace your existing **kubelogin** binary.
30+
- Alternatively, if you have administrator permissions, you can use the `--admin` flag with the `az aksarc get-credentials` command. This method bypasses **kubelogin** authentication by retrieving admin credentials directly:
31+
32+
```azurecli
33+
az aksarc get-credentials -g $resource_group_name -n $aks_cluster_name --file <file-name> --admin
34+
```
35+
36+
## Next steps
37+
38+
[Troubleshoot issues in AKS enabled by Azure Arc](aks-troubleshoot.md)

AKS-Arc/kubernetes-rbac-local.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,12 @@ title: Control access using Microsoft Entra ID and Kubernetes RBAC in AKS enable
33
description: Learn how to use Microsoft Entra group membership to restrict access to cluster resources using Kubernetes role-based access control (Kubernetes RBAC) in AKS Arc.
44
author: sethmanheim
55
ms.author: sethm
6-
ms.lastreviewed: 07/26/2024
6+
ms.lastreviewed: 06/17/2025
77
ms.reviewer: abha
88
ms.topic: how-to
99
ms.custom:
1010
- devx-track-azurecli
11-
ms.date: 07/26/2024
11+
ms.date: 06/17/2025
1212

1313
# Intent: As an IT Pro, I need to learn how to enable Kubernetes role-based access control so that I can manage access to resources.
1414
# Keyword: Kubernetes role-based access control
@@ -34,6 +34,9 @@ Before you set up Kubernetes RBAC using Microsoft Entra ID, you must have the fo
3434
- To access the Kubernetes cluster directly using the `az aksarc get-credentials` command, you need the **Microsoft.HybridContainerService/provisionedClusterInstances/listUserKubeconfig/action**, which is included in the **Azure Kubernetes Service Arc Cluster User** role permissions
3535
- To access the Kubernetes cluster from anywhere with a proxy mode using `az connectedk8s proxy` command, you need the **Microsoft.Kubernetes/connectedClusters/listClusterUserCredential/action**, which is included in **Azure Arc-enabled Kubernetes Cluster User** role permission. Meanwhile, you need to verify that the agents and the machine performing the onboarding process meet the network requirements in [Azure Arc-enabled Kubernetes network requirements](/azure/azure-arc/kubernetes/network-requirements?tabs=azure-cloud#details).
3636

37+
> [!NOTE]
38+
> When you use **kubelogin version 1.9.0** with Microsoft Entra authentication and Kubernetes RBAC in AKS on Azure Local, you might encounter Entra authentication prompts for each command you run. For a solution to this known issue, see [Repeated Entra authentication prompts when running kubectl with Kubernetes RBAC](entra-prompts.md).
39+
3740
## Optional first steps
3841

3942
If you don't already have a Microsoft Entra group that contains members, you might want to create a group and add some members, so that you can follow the instructions in this article.

azure-local/concepts/physical-network-requirements.md

Lines changed: 22 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ If your switch isn't included, contact your switch vendor to ensure that your sw
3939

4040
# [Arista](#tab/Arista)
4141

42-
### 23H2
42+
### 24H2
4343

4444
|Model |Firmware|Management |Storage |Compute (Standard)|Compute (SDN)|
4545
|----- |---| :-: | :-: | :-: | :-: |
@@ -53,7 +53,7 @@ If your switch isn't included, contact your switch vendor to ensure that your sw
5353
> [!NOTE]
5454
> Guest RDMA requires both Compute (Standard) and Storage.
5555
56-
### 22H2
56+
### 23H2
5757

5858
|Model |Firmware|Management |Storage |Compute (Standard)|Compute (SDN)|
5959
|----- |---| :-: | :-: | :-: | :-: |
@@ -69,7 +69,7 @@ If your switch isn't included, contact your switch vendor to ensure that your sw
6969
7070

7171
# [Aruba](#tab/Aruba)
72-
### 23H2
72+
### 24H2
7373

7474
|Model |Firmware|Management |Storage |Compute (Standard)|Compute (SDN)|
7575
|----- |---| :-: | :-: | :-: | :-: |
@@ -84,7 +84,7 @@ If your switch isn't included, contact your switch vendor to ensure that your sw
8484

8585
> [!NOTE]
8686
> Guest RDMA requires both Compute (Standard) and Storage.
87-
### 22H2
87+
### 23H2
8888

8989
|Model |Firmware|Management |Storage |Compute (Standard)|Compute (SDN)|
9090
|----- |---| :-: | :-: | :-: | :-: |
@@ -100,7 +100,7 @@ If your switch isn't included, contact your switch vendor to ensure that your sw
100100
> Guest RDMA requires both Compute (Standard) and Storage.
101101
# [Cisco](#tab/Cisco)
102102

103-
### 23H2
103+
### 24H2
104104
<!-- > [!Important]
105105
> NX-OS version 10.3(2)F or later is required. -->
106106

@@ -116,7 +116,7 @@ If your switch isn't included, contact your switch vendor to ensure that your sw
116116
| [Nexus 9300-H1](https://www.cisco.com/c/en/us/products/collateral/switches/nexus-9000-series-switches/nb-06-nexus-93400ld-h1-switch-ds-cte-en.html) <br> (10, 25 GbE)|NX-OS 10.4(2) or later|&check;| &check;| &check;| &check; |
117117
> [!NOTE]
118118
> Guest RDMA requires both Compute (Standard) and Storage.
119-
### 22H2
119+
### 23H2
120120
<!-- > [!Important]
121121
> NX-OS version 10.3(2)F or later is required. -->
122122

@@ -135,7 +135,7 @@ If your switch isn't included, contact your switch vendor to ensure that your sw
135135
136136

137137
# [Dell](#tab/Dell)
138-
### 23H2
138+
### 24H2
139139

140140
|Model |Firmware| Management | Storage | Compute (Standard)| Compute (SDN)|
141141
|----- |---| :-: | :-: | :-: | :-: |
@@ -151,7 +151,7 @@ If your switch isn't included, contact your switch vendor to ensure that your sw
151151

152152
> [!NOTE]
153153
> Guest RDMA requires both Compute (Standard) and Storage.
154-
### 22H2
154+
### 23H2
155155

156156
|Model |Firmware| Management | Storage | Compute (Standard)| Compute (SDN)|
157157
|----- |---| :-: | :-: | :-: | :-: |
@@ -169,15 +169,15 @@ If your switch isn't included, contact your switch vendor to ensure that your sw
169169
> Guest RDMA requires both Compute (Standard) and Storage.
170170
171171
# [HPE](#tab/HPE)
172-
### 23H2
172+
### 24H2
173173

174174
|Model |Firmware| Management | Storage | Compute (Standard)| Compute (SDN)|
175175
|----- |---| :-: | :-: | :-: | :-: |
176176
| [5944 series](https://www.hpe.com/psnow/doc/4aa5-4495enw?jumpid=in_lit-psnow-red) <br>(10, 100 GbE)|Comware 7 version R6710 or later |&check;| &check;| &check;| &check; |
177177
| [5945 series](https://www.hpe.com/psnow/doc/a00049249enw) <br>(10, 25, 100 GbE)|Comware 7 version R6710 or later |&check;| &check;| &check;| &check; |
178178
> [!NOTE]
179179
> Guest RDMA requires both Compute (Standard) and Storage.
180-
### 22H2
180+
### 23H2
181181

182182
|Model |Firmware| Management | Storage | Compute (Standard)| Compute (SDN)|
183183
|----- |---| :-: | :-: | :-: | :-: |
@@ -188,14 +188,14 @@ If your switch isn't included, contact your switch vendor to ensure that your sw
188188
189189

190190
# [Juniper](#tab/Juniper)
191-
### 23H2
191+
### 24H2
192192

193193
|Model |Firmware| Management | Storage | Compute (Standard)| Compute (SDN)|
194194
|----- |---| :-: | :-: | :-: | :-: |
195195
| [QFX5120 series](https://www.juniper.net/content/dam/www/assets/datasheets/us/en/switches/qfx5120-ethernet-switch-datasheet.pdf) <br>(10, 25, 100 GbE) |Junos 23.4R2.13 or later|&check;| &check;| &check;| &check; |
196196
> [!NOTE]
197197
> Guest RDMA requires both Compute (Standard) and Storage.
198-
### 22H2
198+
### 23H2
199199

200200
|Model |Firmware|Management |Storage |Compute (Standard)|Compute (SDN)|
201201
|----- |---| :-: | :-: | :-: | :-: |
@@ -210,15 +210,15 @@ If your switch isn't included, contact your switch vendor to ensure that your sw
210210
211211
# [NETGEAR](#tab/NETGEAR)
212212

213-
### 23H2
213+
### 24H2
214214
|Model |Firmware| Management | Storage | Compute (Standard)| Compute (SDN)|
215215
|----- |---| :-: | :-: | :-: | :-: |
216216
| [M4250](https://www.downloads.netgear.com/files/GDC/M4250/M4250_Datasheet.pdf) <br>(1, 2.5, 10 GbE)|Version 13.0.4.26 or later |&check;| | &check;| |
217217
| [M4350](https://www.downloads.netgear.com/files/GDC/M4350/M4350_Datasheet.pdf) <br>(1, 2.5, 5, 10, 25, 100 GbE)|Version 14.0.2.26 or later |&check;| | &check;| |
218218
| [M4500](https://www.netgear.com/assets/campaign/121401/images/m4500.pdf) <br>(10, 25, 100 GbE)|Version 7.0.3.9 or later |&check;| | &check;| &check; |
219219
> [!NOTE]
220220
> Guest RDMA requires both Compute (Standard) and Storage.
221-
### 22H2
221+
### 23H2
222222
|Model |Firmware| Management | Storage | Compute (Standard)| Compute (SDN)|
223223
|----- |---| :-: | :-: | :-: | :-: |
224224
| [M4250](https://www.downloads.netgear.com/files/GDC/M4250/M4250_Datasheet.pdf) <br>(1, 2.5, 10 GbE)|Version 13.0.4.26 or later |&check;| | &check;| |
@@ -229,7 +229,7 @@ If your switch isn't included, contact your switch vendor to ensure that your sw
229229
230230

231231
# [NVIDIA](#tab/NVIDIA)
232-
### 23H2
232+
### 24H2
233233

234234
|Model |Firmware| Management | Storage | Compute (Standard)| Compute (SDN)|
235235
|----- |---| :-: | :-: | :-: | :-: |
@@ -239,7 +239,7 @@ If your switch isn't included, contact your switch vendor to ensure that your sw
239239
> [!NOTE]
240240
> Guest RDMA requires both Compute (Standard) and Storage.
241241
242-
### 22H2
242+
### 23H2
243243

244244
|Model |Firmware| Management | Storage | Compute (Standard)| Compute (SDN)|
245245
|----- |---| :-: | :-: | :-: | :-: |
@@ -250,15 +250,15 @@ If your switch isn't included, contact your switch vendor to ensure that your sw
250250
> Guest RDMA requires both Compute (Standard) and Storage.
251251
252252
# [Supermicro](#tab/Supermicro)
253-
### 23H2
253+
### 24H2
254254

255255
|Model |Firmware| Management | Storage | Compute (Standard)| Compute (SDN)|
256256
|----- |---| :-: | :-: | :-: | :-: |
257257
| [SSE-C4632](https://www.supermicro.com/datasheet/datasheet_SSE-C4632.pdf) <br>(10, 25, 100 GbE)|Broadcom Advanced Enterprise SONiC OS 4.2.1 or later |&check;| &check;| &check;| &check; |
258258
| [SSE-T8032](https://www.supermicro.com/datasheet/datasheet_SSE-T8032S.pdf) <br>(10, 25, 100, 400 GbE)|Broadcom Advanced Enterprise SONiC OS 4.2.1 or later |&check;| &check;| &check;| &check; |
259259
> [!NOTE]
260260
> Guest RDMA requires both Compute (Standard) and Storage.
261-
### 22H2
261+
### 23H2
262262

263263
|Model |Firmware| Management | Storage | Compute (Standard)| Compute (SDN)|
264264
|----- |---| :-: | :-: | :-: | :-: |
@@ -277,9 +277,9 @@ This section lists industry standards that are mandatory for the specific roles
277277
> Network adapters used for compute, storage, and management traffic require Ethernet. For more information, see [Host network requirements](host-network-requirements.md).
278278
279279
Here are the mandatory IEEE standards and specifications:
280-
# [23H2](#tab/23H2reqs)
280+
# [24H2](#tab/24H2reqs)
281281

282-
### 23H2 Role Requirements
282+
### 24H2 Role Requirements
283283

284284
|Requirement |Management | Storage | Compute (Standard)| Compute (SDN)|
285285
|----- | :-: | :-: | :-: | :-: |
@@ -344,9 +344,9 @@ Ethernet switches used for Azure Local SDN compute traffic must support Border G
344344

345345
Ethernet switches used for Azure Local management traffic must support DHCP relay agent. The DHCP relay agent is any TCP/IP host which is used to forward requests and replies between the DHCP server and client when the server is present on a different network. It is required for PXE boot services. [RFC 3046: DHCPv4](https://www.rfc-editor.org/rfc/rfc3046) or [RFC 6148: DHCPv4](https://www.rfc-editor.org/rfc/rfc6148.html#:~:text=RFC%204388%20defines%20a%20mechanism%20for%20relay%20agents,starts%20receiving%20data%20to%20and%20from%20the%20clients.)
346346

347-
# [22H2](#tab/22H2reqs)
347+
# [23H2](#tab/23H2reqs)
348348

349-
### 22H2 Role Requirements
349+
### 23H2 Role Requirements
350350

351351
|Requirement |Management | Storage | Compute (Standard)| Compute (SDN)|
352352
|----- | :-: | :-: | :-: | :-: |
@@ -403,17 +403,13 @@ LLDP allows organizations to define and encode their own custom TLVs. These are
403403
| IEEE 802.3 | Maximum Frame Size (Subtype = 4) |
404404

405405
### Maximum Transmission Unit
406-
*New Requirement in 22H2*
407406

408407
The maximum transmission unit (MTU) is the largest size frame or packet that can be transmitted across a data link. A range of 1514 - 9174 is required for SDN encapsulation.
409408
### Border Gateway Protocol
410-
*New Requirement in 22H2*
411409

412410
Ethernet switches used for Azure Local SDN compute traffic must support Border Gateway Protocol (BGP). BGP is a standard routing protocol used to exchange routing and reachability information between two or more networks. Routes are automatically added to the route table of all subnets with BGP propagation enabled. This is required to enable tenant workloads with SDN and dynamic peering. [RFC 4271: Border Gateway Protocol 4](https://www.rfc-editor.org/rfc/rfc4271)
413411

414412
### DHCP Relay Agent
415-
*New Requirement in 22H2*
416-
417413

418414
Ethernet switches used for Azure Local management traffic must support DHCP relay agent. The DHCP relay agent is any TCP/IP host which is used to forward requests and replies between the DHCP server and client when the server is present on a different network. It is required for PXE boot services. [RFC 3046: DHCPv4](https://www.rfc-editor.org/rfc/rfc3046) or [RFC 6148: DHCPv4](https://www.rfc-editor.org/rfc/rfc6148.html#:~:text=RFC%204388%20defines%20a%20mechanism%20for%20relay%20agents,starts%20receiving%20data%20to%20and%20from%20the%20clients.)
419415

azure-local/deploy/deploy-via-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Deploy an Azure Local instance using the Azure portal
33
description: Learn how to deploy an Azure Local instance from the Azure portal
44
author: alkohli
55
ms.topic: how-to
6-
ms.date: 05/07/2025
6+
ms.date: 06/24/2025
77
ms.author: alkohli
88
ms.service: azure-local
99
#CustomerIntent: As an IT Pro, I want to deploy an Azure Local instance of 1-16 machines via the Azure portal so that I can host VM and container-based workloads on it.
@@ -309,7 +309,7 @@ To monitor storage pool consumption, use the steps in [Enable health alerts](../
309309

310310
### Enable RDP
311311

312-
For security reasons, Remote Desktop Protocol (RDP) is disabled and the local administrator renamed after the deployment completes on Azure Local instances. For more information on the renamed administrator, go to [Local builtin user accounts](../concepts/other-security-features.md#about-local-built-in-user-accounts).
312+
For security reasons, Remote Desktop Protocol (RDP) is disabled and the local administrator renamed after the deployment completes on Azure Local instances. For more information on the renamed administrator, go to [Local builtin user accounts](../concepts/security-features.md#local-built-in-user-accounts).
313313

314314
You might need to connect to the system via RDP to deploy workloads. Follow these steps to connect to your system via the Remote PowerShell and then enable RDP:
315315

0 commit comments

Comments
 (0)