You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[AKS] aks enable-addons: Add new parameter --enable-msi-auth-for-monitoring to support enabling managed identity auth (Azure#21661)
* add cluster spn with metric publisher role to aks cluster resource
* refactor the code
* fix default workspace issue in china cloud
* add metrics publisher role assignment only in public cloud
* fix pr feedback
* fix build error
* fix lint error
* update region mapping
* order regions in sortorder
* fix trailing whitespaces
* fix default log analytics region mapping
* fix map index error if key not found
* fix lint errors
* fix uninitialized error
* update to new API version for ARO
* use latest api version for ARO
* revert to workspace_resource_id in os management profile
* fix test case
* fixed test failure
* added recording file
* dont containerinsights solution
* remove tests
* remove unused imports
* remove tests
* revert import change
* revert change
* monitoring addon msi updates
* monitoring addon msi updates
* monitoring addon msi updates
* monitoring addon msi updates
* monitoring addon msi updates
* monitoring addon msi updates
* monitoring addon msi updates
* health updates
* update ws region mapping for canary regions
* remove Microsoft-KubeHealth stream from ci dcr
* bug fix
Copy file name to clipboardexpand all lines: src/azure-cli/azure/cli/command_modules/acs/_help.py
+8
Original file line number
Diff line number
Diff line change
@@ -339,6 +339,7 @@
339
339
- http_application_routing : configure ingress with automatic public DNS name creation.
340
340
- monitoring : turn on Log Analytics monitoring. Uses the Log Analytics Default Workspace if it exists, else creates one.
341
341
Specify "--workspace-resource-id" to use an existing workspace.
342
+
Specify "--enable-msi-auth-for-monitoring" to use Managed Identity Auth.
342
343
If monitoring addon is enabled --no-wait argument will have no effect
343
344
- azure-policy : enable Azure policy. The Azure Policy add-on for AKS enables at-scale enforcements and safeguards on your clusters in a centralized, consistent manner.
344
345
Learn more at aka.ms/aks/policy.
@@ -396,6 +397,9 @@
396
397
- name: --workspace-resource-id
397
398
type: string
398
399
short-summary: The resource ID of an existing Log Analytics Workspace to use for storing monitoring data. If not specified, uses the default Log Analytics Workspace if it exists, otherwise creates one.
400
+
- name: --enable-msi-auth-for-monitoring
401
+
type: bool
402
+
short-summary: Enable Managed Identity Auth for Monitoring addon.
399
403
- name: --uptime-sla
400
404
type: bool
401
405
short-summary: Enable a paid managed cluster service with a financially backed SLA.
@@ -778,6 +782,7 @@
778
782
These addons are available:
779
783
- http_application_routing : configure ingress with automatic public DNS name creation.
780
784
- monitoring : turn on Log Analytics monitoring. Requires "--workspace-resource-id".
785
+
Requires "--enable_msi_auth_for_monitoring" for managed identity auth.
781
786
If monitoring addon is enabled --no-wait argument will have no effect
782
787
- virtual-node : enable AKS Virtual Node. Requires --subnet-name to provide the name of an existing subnet for the Virtual Node to use.
783
788
- azure-policy : enable Azure policy. The Azure Policy add-on for AKS enables at-scale enforcements and safeguards on your clusters in a centralized, consistent manner.
@@ -792,6 +797,9 @@
792
797
- name: --workspace-resource-id
793
798
type: string
794
799
short-summary: The resource ID of an existing Log Analytics Workspace to use for storing monitoring data.
800
+
- name: --enable-msi-auth-for-monitoring
801
+
type: bool
802
+
short-summary: Enable Managed Identity Auth for Monitoring addon.
795
803
- name: --appgw-name
796
804
type: string
797
805
short-summary: Name of the application gateway to create/use in the node resource group. Use with ingress-azure addon.
0 commit comments