The MIC component by default relies on /etc/kubernetes/azure.json
to get cluster configuration and credentials. Since the /etc/kubernetes/azure.json
doesn’t exist in ARO clusters, the AAD Pod Identity components will need to be deployed with a dedicated SP/managed identity to provide access to Azure.
helm repo add aad-pod-identity https://raw.githubusercontent.com/Azure/aad-pod-identity/master/charts
# Helm 3
# If using managed identity to provide MIC access to Azure, then set adminsecret.clientID=msi and adminsecret.clientSecret=msi
# Set adminsecret.useMSI=false if using service principal to provide MIC access to Azure
helm install aad-pod-identity aad-pod-identity/aad-pod-identity \
--set adminsecret.cloud=<azure cloud name> \
--set adminsecret.subscriptionID=<subscription id> \
--set adminsecret.resourceGroup=<node resource group> \
--set adminsecret.vmType=vmss \
--set adminsecret.tenantID=<tenant id> \
--set adminsecret.clientID=<service principal clientID> \
--set adminsecret.clientSecret=<service principal clientSecret> \
--set-string adminsecret.useMSI=false \
--set adminsecret.userAssignedMSIClientID=<ClientID from identity>
If deploying using deployment yamls, refer to the doc here.
Follow the docs here on how to install AAD Pod Identity in managed mode.
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.