You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When using Workload Identity to enable access to ACR, add the following patch to
@@ -270,13 +276,17 @@ patches:
270
276
azure.workload.identity/use: "true"
271
277
```
272
278
273
-
To use Workload Identity, you have to install the Workload Identity
274
-
mutating webhook and create an identity that has access to ACR. Next, establish
279
+
Ensure Workload Identity is properly set up on your cluster and the mutating webhook is installed.
280
+
Create an identity that has access to ACR. Next, establish
275
281
a federated identity between the source-controller ServiceAccount and the
276
-
identity. Patch the source-controller Pod and ServiceAccount as shown in the patch
282
+
identity. Patch the source-controller Deployment and ServiceAccount as shown in the patch
277
283
above. Please take a look at this [guide](https://azure.github.io/azure-workload-identity/docs/quick-start.html#6-establish-federated-identity-credential-between-the-identity-and-the-service-account-issuer--subject).
278
284
279
-
##### AAD Pod Identity
285
+
##### Deprecated: AAD Pod Identity
286
+
287
+
**Warning:** The AAD Pod Identity project will be archived in
When using Workload Identity to enable access to ACR, add the following patch to
@@ -203,13 +209,17 @@ patches:
203
209
azure.workload.identity/use: "true"
204
210
```
205
211
206
-
To use Workload Identity, you have to install the Workload Identity
207
-
mutating webhook and create an identity that has access to ACR. Next, establish
208
-
a federated identity between the source-controller ServiceAccount and the
209
-
identity. Patch the source-controller Pod and ServiceAccount as shown in the patch
212
+
Ensure Workload Identity is properly set up on your cluster and the mutating webhook is installed.
213
+
Create an identity that has access to ACR. Next, establish
214
+
a federated identity between the source-controller ServiceAccount and the
215
+
identity. Patch the source-controller Deployment and ServiceAccount as shown in the patch
210
216
above. Please take a look at this [guide](https://azure.github.io/azure-workload-identity/docs/quick-start.html#6-establish-federated-identity-credential-between-the-identity-and-the-service-account-issuer--subject).
211
217
212
-
##### AAD Pod Identity
218
+
##### Deprecated: AAD Pod Identity
219
+
220
+
**Note:** The AAD Pod Identity project will be archived in [September 2023](https://github.com/Azure/aad-pod-identity#-announcement),
221
+
and you are advised to use Workload Identity instead.
222
+
213
223
When using aad-pod-identity to enable access to ACR, add the following patch to
214
224
your bootstrap repository, in the `flux-system/kustomization.yaml` file:
215
225
@@ -234,7 +244,7 @@ has to be used to give the `source-controller` pod access to the ACR.
234
244
To do this, you have to install `aad-pod-identity` on your cluster, create a managed identity
235
245
that has access to the container registry (this can also be the Kubelet identity
236
246
if it has `AcrPull` role assignment on the ACR), create an `AzureIdentity` and `AzureIdentityBinding`
237
-
that describe the managed identity and then label the `source-controller` pods
247
+
that describe the managed identity and then label the `source-controller` deployment
238
248
with the name of the AzureIdentity as shown in the patch above. Please take a look
239
249
at [this guide](https://azure.github.io/aad-pod-identity/docs/) or
0 commit comments