Match Pods in the Namespace
By default, AAD Pod Identity matches pods to identities across namespaces.
By default, AAD Pod Identity matches pods to identities across namespaces.
AAD Pod Identity is disabled by default on Clusters with Kubenet starting from release v1.7.
To enable user to use a separate service principal (aad-pod-identity admin service principal) other than the cluster service principal and to move away from /etc/kubernetes/azure.json.
How to setup AAD Pod Identity on Azure RedHat OpenShift (ARO)
NMI pods modify the nodes' iptables to intercept calls to Azure Instance Metadata endpoint. This means any request that’s made to the Metadata endpoint will be intercepted by NMI even if the pod doesn’t use aad-pod-identity.
This will help validate various CRDs and the azure resources used in aad-pod-identity. Currently validation of User assigned MSI format in Azure Identity is supported.
Optional configuration feature flags.
Using AAD Pod Identity in custom Azure cloud environment.
Migrating from Standard to Managed mode for AAD Pod Identity
In this mode, there is only the NMI component deployed in the cluster. The identity assignment needs to be manually performed.
Prometheus is a systems and service monitoring system. It collects metrics from configured targets at given intervals, evaluates rule expressions,displays the results, and can trigger alerts if some condition is observed to be true.
If the cluster has Pod Security Policies (PSP) enabled that block hostNetwork and privileged mode, then the aad-pod-identity will be unable to run.
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.