Skip to content

Commit ed9b3b0

Browse files
PCP-1889: add disableLocalAccounts method and correct order of steps (#5035) (#5039)
* docs: add disableLocalAccounts method and correct order of steps * ci: auto-formatting prettier issues * Apply suggestions from code review --------- Co-authored-by: benradstone <[email protected]> (cherry picked from commit d2df01d) Co-authored-by: Ben Radstone <[email protected]>
1 parent 51ba3f7 commit ed9b3b0

File tree

1 file changed

+45
-32
lines changed
  • docs/docs-content/clusters/public-cloud/azure

1 file changed

+45
-32
lines changed

docs/docs-content/clusters/public-cloud/azure/aks.md

Lines changed: 45 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,22 @@ explains how you can create an Azure AKS cluster managed by Palette.
7474

7575
6. Under **Managed Kubernetes**, select **Azure AKS** and select your Azure AKS cluster profile.
7676

77-
7. If you want to configure Pod and Service CIDR, populate the following configuration template and add the
77+
7. Palette displays the cluster profile layers. Review the profile layers and customize parameters as desired in the
78+
YAML editor that displays when you click on **Values** after selecting a layer.
79+
80+
You can configure custom OpenID Connect (OIDC) for Azure clusters at the Kubernetes layer. Check out
81+
[Configure OIDC Identity Provider](../../../integrations/kubernetes.md#configure-oidc-identity-provider) for more
82+
information.
83+
84+
:::warning
85+
86+
All OIDC options require you to map a set of users or groups to a Kubernetes RBAC role. To learn how to map a
87+
Kubernetes role to users and groups, refer to
88+
[Create Role Bindings](../../cluster-management/cluster-rbac.md#create-role-bindings).
89+
90+
:::
91+
92+
8. If you want to configure Pod and Service CIDR, populate the following configuration template and add the
7893
configuration to your Kubernetes cluster profile layer.
7994

8095
```yaml
@@ -83,7 +98,7 @@ explains how you can create an Azure AKS cluster managed by Palette.
8398
serviceClusterIpRange: "<service-cidr>"
8499
```
85100
86-
8. If you want to [use a managed identity](https://learn.microsoft.com/en-us/azure/aks/use-managed-identity), populate
101+
9. If you want to [use a managed identity](https://learn.microsoft.com/en-us/azure/aks/use-managed-identity), populate
87102
the following configuration template and add the configuration to your Kubernetes cluster profile layer.
88103
89104
- `providerID` – User-assigned identity ID in the format
@@ -96,7 +111,7 @@ explains how you can create an Azure AKS cluster managed by Palette.
96111
- providerID: "<provider-id-2>"
97112
```
98113

99-
9. If you want to integrate with Microsoft Entra ID (formerly Azure Active Directory), populate the following
114+
10. If you want to integrate with Microsoft Entra ID (formerly Azure Active Directory), populate the following
100115
configuration template and add the configuration to your Kubernetes cluster profile layer.
101116

102117
```yaml
@@ -108,7 +123,22 @@ explains how you can create an Azure AKS cluster managed by Palette.
108123
- <admin-group-object-id-2>
109124
```
110125

111-
10. If you want to add a custom AKS add-on profile, populate the following configuration template and add the
126+
Additionally, if you want to disable
127+
[local accounts](https://learn.microsoft.com/en-us/azure/aks/manage-local-accounts-managed-azure-ad), add the
128+
`disableLocalAccounts: true` entry to your Kubernetes cluster profile layer within the
129+
`managedControlPlane.aadProfile` section.
130+
131+
```yaml {7}
132+
managedControlPlane:
133+
aadProfile:
134+
managed: true
135+
adminGroupObjectIDs:
136+
- <admin-group-object-id>
137+
- <admin-group-object-id-2>
138+
disableLocalAccounts: true
139+
```
140+
141+
11. If you want to add a custom AKS add-on profile, populate the following configuration template and add the
112142
configuration to your Kubernetes cluster profile layer.
113143

114144
```yaml
@@ -134,26 +164,9 @@ explains how you can create an Azure AKS cluster managed by Palette.
134164
logAnalyticsWorkspaceResourceID: "<log-analytics-workspace-resource-id>"
135165
```
136166

137-
11. Click **Next** to continue.
138-
139-
12. Palette displays the cluster profile layers. Review the profile layers and customize parameters as desired in the
140-
YAML files that display when you select a layer.
141-
142-
You can configure custom OpenID Connect (OIDC) for Azure clusters at the Kubernetes layer. Check out
143-
[Configure OIDC Identity Provider](../../../integrations/kubernetes.md#configure-oidc-identity-provider) for more
144-
information.
145-
146-
:::warning
147-
148-
All OIDC options require you to map a set of users or groups to a Kubernetes RBAC role. To learn how to map a
149-
Kubernetes role to users and groups, refer to
150-
[Create Role Bindings](../../cluster-management/cluster-rbac.md#create-role-bindings).
151-
152-
:::
153-
154-
13. Click **Next** to continue.
167+
12. Click **Next** to continue.
155168

156-
14. Configure your Azure AKS cluster using the following table for reference.
169+
13. Configure your Azure AKS cluster using the following table for reference.
157170

158171
:::warning
159172

@@ -188,9 +201,9 @@ explains how you can create an Azure AKS cluster managed by Palette.
188201
| **Control Plane Subnet** | Select the control plane subnet. |
189202
| **Worker Subnet** | Select the worker network. |
190203

191-
15. Click **Next** to continue.
204+
14. Click **Next** to continue.
192205

193-
16. Provide the following node pool and cloud configuration information. To learn more about node pools, review the
206+
15. Provide the following node pool and cloud configuration information. To learn more about node pools, review the
194207
[Node Pool](../../cluster-management/node-pool.md) guide.
195208

196209
#### System Node Pool
@@ -250,24 +263,24 @@ explains how you can create an Azure AKS cluster managed by Palette.
250263
| **Managed disk** | Choose a storage option. For more information, refer to Microsoft's [Storage Account Overview](https://learn.microsoft.com/en-us/azure/storage/common/storage-account-overview) reference. For information about Solid State Drive (SSD) disks, refer to [Standard SSD Disks for Azure Virtual Machine Workloads](https://azure.microsoft.com/en-us/blog/preview-standard-ssd-disks-for-azure-virtual-machine-workloads/) reference. |
251264
| **Disk size** | You can choose disk size based on your requirements. The default size is **60**. |
252265

253-
17. Click **Next** to continue.
266+
16. Click **Next** to continue.
254267

255-
18. Specify your preferred **OS Patching Schedule**.
268+
17. Specify your preferred **OS Patching Schedule**.
256269

257-
19. Enable any scan options you want Palette to perform, and select a scan schedule. Palette provides support for
270+
18. Enable any scan options you want Palette to perform, and select a scan schedule. Palette provides support for
258271
Kubernetes configuration security, penetration testing, and conformance testing.
259272

260-
20. Schedule any backups you want Palette to perform. Review
273+
19. Schedule any backups you want Palette to perform. Review
261274
[Backup and Restore](../../cluster-management/backup-restore/backup-restore.md) for more information.
262275

263-
21. If you're using custom OIDC, configure the Role-Based Access Control (RBAC). You must map a set of users or groups
276+
20. If you're using custom OIDC, configure the Role-Based Access Control (RBAC). You must map a set of users or groups
264277
to a Kubernetes RBAC role. To learn how to map a Kubernetes role to users and groups, refer to
265278
[Create Role Bindings](../../cluster-management/cluster-rbac.md#create-role-bindings). Refer to
266279
[Use RBAC with OIDC](../../../integrations/kubernetes.md#use-rbac-with-oidc) for an example.
267280

268-
22. Click **Validate** and review the cluster configuration and settings summary.
281+
21. Click **Validate** and review the cluster configuration and settings summary.
269282

270-
23. Click **Finish Configuration** to deploy the cluster. Provisioning Azure AKS clusters can take several minutes.
283+
22. Click **Finish Configuration** to deploy the cluster. Provisioning Azure AKS clusters can take several minutes.
271284

272285
The cluster details page contains the status and details of the deployment. Use this page to track the deployment
273286
progress.

0 commit comments

Comments
 (0)