Skip to content

Commit 0a876f8

Browse files
committed
Kaito fixes
1 parent d0e74ea commit 0a876f8

File tree

1 file changed

+6
-8
lines changed

1 file changed

+6
-8
lines changed

scenarios/AksKaito/README.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,6 @@ export RANDOM_ID="$(openssl rand -hex 3)"
4545
export AZURE_RESOURCE_GROUP="myKaitoResourceGroup$RANDOM_ID"
4646
export REGION="centralus"
4747
export CLUSTER_NAME="myClusterName$RANDOM_ID"
48-
export SUBSCRIPTION_ID="0c8875c7-e423-4caa-827a-1f0350bd8dd3"
4948

5049
az group create \
5150
--name $AZURE_RESOURCE_GROUP \
@@ -117,13 +116,6 @@ export MC_RESOURCE_GROUP=$(az aks show --resource-group ${AZURE_RESOURCE_GROUP}
117116
--query nodeResourceGroup \
118117
-o tsv)
119118

120-
export KAITO_IDENTITY_NAME="ai-toolchain-operator-${CLUSTER_NAME}"
121-
122-
export AKS_OIDC_ISSUER=$(az aks show --resource-group "${AZURE_RESOURCE_GROUP}" \
123-
--name "${CLUSTER_NAME}" \
124-
--query "oidcIssuerProfile.issuerUrl" \
125-
-o tsv)
126-
127119
export PRINCIPAL_ID=$(az identity show --name "ai-toolchain-operator-${CLUSTER_NAME}" \
128120
--resource-group "${MC_RESOURCE_GROUP}" \
129121
--query 'principalId' \
@@ -139,6 +131,12 @@ az role assignment create --role "Contributor" \
139131
Create the federated identity credential between the managed identity, AKS OIDC issuer, and subject using the [az identity federated-credential create](https://learn.microsoft.com/en-us/cli/azure/identity/federated-credential?view=azure-cli-latest) command.
140132

141133
```bash
134+
export KAITO_IDENTITY_NAME="ai-toolchain-operator-${CLUSTER_NAME}"
135+
export AKS_OIDC_ISSUER=$(az aks show --resource-group "${AZURE_RESOURCE_GROUP}" \
136+
--name "${CLUSTER_NAME}" \
137+
--query "oidcIssuerProfile.issuerUrl" \
138+
-o tsv)
139+
142140
az identity federated-credential create --name "kaito-federated-identity" \
143141
--identity-name "${KAITO_IDENTITY_NAME}" \
144142
-g "${MC_RESOURCE_GROUP}" \

0 commit comments

Comments
 (0)