Closed Appelcloud closed 1 year ago
@aaKomplex-IT Thanks for your feedback.
Assigning to content author @JnHs for review.
Hi @aaKomplex-IT ,
Are you saying that "$" should be removed when setting the variables? If that is the case, I agree. For example, it should be 'CLUSTER_NAME="
Let us know if this is not what you meant.
Hi
No I mean there should be a $ to set the variable. Right now there is no $ in the documentation :-)
Venlig hilsen / Best regards
Alexander Appelby It-specialist
M +45 20214624
On 15 Aug 2023, at 20.16, msftjonw @.***> wrote:
Hi @aaKomplex-IThttps://github.com/aaKomplex-IT , Are you saying that "$" should be removed when setting the variables? If that is the case, I agree. For example, it should be 'CLUSTER_NAME=""' instead of '$CLUSTER_NAME=""'.
Let us know if this is not what you meant.
— Reply to this email directly, view it on GitHubhttps://github.com/MicrosoftDocs/azure-docs/issues/113453#issuecomment-1679384873, or unsubscribehttps://github.com/notifications/unsubscribe-auth/AWP6VQUC37H7UFCD7LRC2KTXVO4IDANCNFSM6AAAAAA3MY3P7A. You are receiving this because you were mentioned.Message ID: @.***>
Oh I did not check the doc. If it is already without "$", it is what we were intended to have.
The strange thing for me is that with the "$" in front of the command would not work for me in Azure cloud shell. Could you let me know which environment you are testing in?
I'm testing in Azure Stack HCI environment and not directly from Azure, :-) And are executing it from the Hosts, that might be the reason why i'm not able to get. I can only get it to work with $
That is interesting to know. Just so you know, it is the same for me to test in an UNIX system such as MacOS. I guess Azure Stack HCI is running on Windows OS and it could be more like PowerShell. As far as I know, PowerShell variable setup is like "$test="Jonathan" instead of "test=Jonathan".
Yes correct. Azure Stack OS is roughty the same as a Windows Server Core edition (just roughty)
When I followed the documentation i rewrote the commands to Powershell. Just to let you know, I have only attempted to execute THIS documenation and not the the other Azure Arc AKS RBAC hybrid documenation pages.
I will of course try to attempt it when the rest of my Setup is ready.
Sounds good! Keep us posted!
Hi Jon
Just an update on this post. I have been successfully been able to enable Azure AD RBAC with the PowerShell commands I posted. This has been done in conjunction with Jacek P from the High Available Team
It could be nice with a powershell opportunity available in the documenation aswell as the Azure CLI of course :-)
Thanks @aaKomplex-IT . We will take this feedback of an opportunity to improve for sure.
Thank you so much, @aaKomplex-IT. I've created a work item and will coordinate with @msftjonw to incorporate PowerShell commands into this topic. Since we are tracking this update internally, I'll close this GitHub issue now. Please continue to let us know if you have questions or suggestions for the docs!
The Below is commands and text that in my opinion needs to be changed. Almost all attributes has the $ placed in the wrong place.
Create a new Azure AD application and get its
appId
value. This value is used in later steps asserverApplicationId
.Update the application's group membership claims. Run the commands in the same directory as the
oauth2-permissions.json
file. RBAC for Azure Arc-enabled Kubernetes requiressignInAudience
to be set to AzureADMyOrg:Create a service principal and get its
password
field value. This value is required later asserverApplicationSecret
when you're enabling this feature on the cluster. This secret is valid for one year by default and will need to be rotated after that. To set a custom expiration duration, useaz ad sp credential reset
:Create a new Azure AD application and get its
appId
value. This value is used in later steps asclientApplicationId
.Grant the required permissions for the client application. RBAC for Azure Arc-enabled Kubernetes requires
signInAudience
to be set to AzureADMyOrg:Create a new Azure AD application and get its
appId
value. This value is used in later steps asserverApplicationId
.Create a service principal and get its
password
field value. This value is required later asserverApplicationSecret
when you're enabling this feature on the cluster. This secret is valid for one year by default and will need to be rotated after that. To set a custom expiration duration, useaz ad sp credential reset
:Create a new Azure AD application and get its
appId
value. This value is used in later steps asclientApplicationId
.Run the following command to create the new custom role:
Document Details
⚠ Do not edit this section. It is required for learn.microsoft.com ➟ GitHub issue linking.