Azure Kubernetes Service (AKS) Container Provider
After initial installation and creation of a ManageIQ environment you can add an Azure Kubernetes Service Container provider.
You will need to retrieve the cluster hostname and the cluster_admin token.
Navigate to your AKS cluster in the Azure Portal (https://portal.azure.com). In the Overview
tab search for the API server address
. This is the hostname
that you will need when you create your provider.
Next you need to retrieve your cluster_admin token, click on the Connect
button. This will open a panel with instructions on running the az
command line utility in Azure Cloud Shell
(you can also run this locally if you have the az
utility installed).
az account set --subscription SUBSCRIPTION_ID
az aks get-credentials --admin --resource-group RESOURCE_GROUP_NAME --name CLUSTER_NAME
Merged "CLUSTER_NAME-admin" as current context in ~/.kube/config
Now grab the token for your user out of the ~.kube/config
file. If this is the only cluster configured in your ~/.kube/config
then you can simply run:
grep 'token: ' .kube/config
token: abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwx
If you already have multiple clusters configured search for your AKS cluster admin user, it will be named clusterAdmin_${RESOURCE_GROUP_NAME}_${CLUSTER_NAME}
-
Browse to menu: Compute > Containers > Providers.
-
Click Configuration, then click (Add a New Containers Provider).
-
Enter a Name for the provider.
-
From the Type list, select Azure Kubernetes Service.
-
Enter the appropriate Zone for the provider. If you do not specify a zone, it is set to
default
. -
In the Default tab, configure the following for the AKS provider:
-
Select a Security Protocol method to specify how to authenticate the provider:
-
SSL: Authenticate the provider securely using a trusted Certificate Authority. Select this option if the provider has a valid SSL certificate and it is signed by a trusted Certificate Authority. No further configuration is required for this option.
-
SSL trusting custom CA: Authenticate the provider with a self-signed certificate. For this option, copy your provider’s CA certificate to the Trusted CA Certificates box in PEM format.
-
SSL without validation: Authenticate the provider insecurely (not recommended).
-
-
Enter the Hostname of the provider that you obtained earlier.
Important:
The Hostname must use a unique fully qualified domain name.
-
Enter the API Port of the provider. The default port is
443
. -
Enter the token that you obtained earlier for your provider in the Token box.
-
Click Validate to confirm that ManageIQ can connect to the Azure Kubernetes Service provider.
-
-
Click Add.