After initial installation and creation of a Infrastructure Automation environment you can add an Azure Kubernetes Service Container provider.
You will need to retrieve the cluster hostname and the cluster_admin token.
Navigate to your AKS cluster in the Azure Portal (https://portal.azure.com). In the Overview
tab search for the API server address
. This is the hostname
that you will need when you create your provider.
Next you need to retrieve your cluster_admin token, click on the Connect
button. This will open a panel with instructions on running the az
command line utility in Azure Cloud Shell
(you can also run this locally if you have the az
utility installed).
az account set --subscription SUBSCRIPTION_ID
az aks get-credentials --admin --resource-group RESOURCE_GROUP_NAME --name CLUSTER_NAME
Merged "CLUSTER_NAME-admin" as current context in ~/.kube/config
Now grab the token for your user out of the ~.kube/config
file. If this is the only cluster configured in your ~/.kube/config
then you can simply run:
grep 'token: ' .kube/config
token: abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwx
If you already have multiple clusters configured search for your AKS cluster admin user, it will be named clusterAdmin_${RESOURCE_GROUP_NAME}_${CLUSTER_NAME}
Browse to menu: Compute > Containers > Providers.
Click Configuration, then
click (Add a New Containers Provider).
Enter a Name for the provider.
From the Type list, select Azure Kubernetes Service.
Enter the appropriate Zone for the provider. If you do not
specify a zone, it is set to default
.
In the Default tab, configure the following for the AKS provider:
Select a Security Protocol method to specify how to authenticate the provider:
SSL: Authenticate the provider securely using a trusted Certificate Authority. Select this option if the provider has a valid SSL certificate and it is signed by a trusted Certificate Authority. No further configuration is required for this option.
SSL trusting custom CA: Authenticate the provider with a self-signed certificate. For this option, copy your provider’s CA certificate to the Trusted CA Certificates box in PEM format.
SSL without validation: Authenticate the provider insecurely (not recommended).
Enter the Hostname of the provider that you obtained earlier.
Important:
The Hostname must use a unique fully qualified domain name.
Enter the API Port of the provider. The default port is
443
.
Enter the token that you obtained earlier for your provider in the Token box.
Click Validate to confirm that Infrastructure Automation can connect to the Azure Kubernetes Service provider.
Click Add.