Open RoFz opened 2 years ago
Thank you for your feedback. This has been routed to the support team for assistance.
route to CXP team
Thanks for the feedback! We are routing this to the appropriate team for follow-up. cc @Azure/aks-pm.
Author: | RoFz |
---|---|
Assignees: | - |
Labels: | `extension/aks-preview`, `customer-reported`, `AKS`, `Service Attention`, `CXP Attention` |
Milestone: | - |
@RoFz I guess you have raised a support ticket too for the same issue and working with our Support Professional.
To assist you further, I am adding Service Team to look into this.
@Azure/aks-pm Could you please look into this and provide an update ?
Describe the bug
Command Name
az k8s-extension create Extension Name: k8s-extension. Version: 1.3.5.
Errors:
To Reproduce:
Steps to reproduce the behavior. Note that argument values have been redacted, as they may contain sensitive information.
az k8s-extension create \ --name azuremlsecure \ --extension-type Microsoft.AzureML.Kubernetes \ --config enableTraining=True \ enableInference=True \ allowInsecureConnections=False \ inferenceRouterServiceType=clusterIP \ sslCname=azureml.<domain>.com \ nodeSelector.azureml=true \ --config-protected sslCertPemFile=azureml-cert.pem \ sslKeyPemFile=azureml-key.pem \ --cluster-type managedClusters \ --cluster-name $aksname \ --resource-group $aksrgname \ --scope cluster
az k8s-extension create \ --name azuremlinsecure \ --extension-type Microsoft.AzureML.Kubernetes \ --config enableTraining=True \ enableInference=True \ allowInsecureConnections=True \ inferenceRouterServiceType=clusterIP \ nodeSelector.azureml=true \ --cluster-type managedClusters \ --cluster-name $aksname \ --resource-group $aksrgname \ --scope cluster
Expected Behavior
Error level = 0 (success) and a similar output:
{ "aksAssignedIdentity": { "principalId": "<obj_id>", "tenantId": null, "type": null }, "autoUpgradeMinorVersion": true, "configurationProtectedSettings": { "scoringFe.sslCert": "", "scoringFe.sslKey": "", "sslCertPemFile": "", "sslKeyPemFile": "" }, "configurationSettings": { "allowInsecureConnections": "False", "clusterId": "/subscriptions/<sub_id>/resourceGroups/<rg_name>/providers/Microsoft.ContainerService/managedClusters/<cluster_name>", "clusterPurpose": "DevTest", "cluster_name": "/subscriptions/<sub_id>/resourceGroups/<rg_name>/providers/Microsoft.ContainerService/managedClusters/<cluster_name>", "cluster_name_friendly": "<cluster_name>", "domain": "westeurope.cloudapp.azure.com", "enableInference": "True", "enableTraining": "True", "inferenceRouterHA": "false", "inferenceRouterServiceType": "clusterIP", "jobSchedulerLocation": "westeurope", "location": "westeurope", "nginxIngress.enabled": "true", "prometheus.prometheusSpec.externalLabels.cluster_name": "/subscriptions/<sub_id>/resourceGroups/<rg_name>/providers/Microsoft.ContainerService/managedClusters/<cluster_name>", "relayserver.enabled": "false", "servicebus.enabled": "false", "sslCname": "azureml.<domain>.com" }, "customLocationSettings": null, "errorInfo": null, "extensionType": "microsoft.azureml.kubernetes", "id": "/subscriptions/<sub_id>/resourceGroups/<rg_name>/providers/Microsoft.ContainerService/managedClusters/<cluster_name>/providers/Microsoft.KubernetesConfiguration/extensions/azuremlsecure", "identity": null, "installedVersion": null, "name": "azuremlsecure", "packageUri": null, "provisioningState": "Succeeded", "releaseTrain": "stable", "resourceGroup": "<rg_name>", "scope": { "cluster": { "releaseNamespace": "azureml" }, "namespace": null }, "statuses": [], "systemData": { "createdAt": "2022-10-21T10:33:39.527695+00:00", "createdBy": null, "createdByType": null, "lastModifiedAt": "2022-10-21T10:33:39.527695+00:00", "lastModifiedBy": null, "lastModifiedByType": null }, "type": "Microsoft.KubernetesConfiguration/extensions", "version": "1.1.12" }
Environment Summary
Additional Context
none
How can one get access to the underlying helm chart of this cli wrapper to properly troubleshoot this?