Rediģēt

Kopīgot, izmantojot


Tutorial: Connect to Azure storage account in Azure Kubernetes Service (AKS) with Service Connector using workload identity

Learn how to create a pod in an AKS cluster, which talks to an Azure storage account using workload identity with the help of Service Connector. In this tutorial, you complete the following tasks:

  • Create an AKS cluster and an Azure storage account.
  • Create a connection between the AKS cluster and the Azure storage account with Service Connector.
  • Clone a sample application that will talk to the Azure storage account from an AKS cluster.
  • Deploy the application to a pod in AKS cluster and test the connection.
  • Clean up resources.

Important

Service Connect within AKS is currently in preview. See the Supplemental Terms of Use for Microsoft Azure Previews for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.

Prerequisites

Create Azure resources

  1. Create a resource group for this tutorial.

    az group create \
        --name MyResourceGroup \
        --location eastus
    
  2. Create an AKS cluster with the following command, or referring to the tutorial. We create the service connection, pod definition and deploy the sample application to this cluster.

    az aks create \
        --resource-group MyResourceGroup \
        --name MyAKSCluster \
        --enable-managed-identity \
        --node-count 1
    
  3. Connect to the cluster with the following command.

    az aks get-credentials \
        --resource-group MyResourceGroup \
        --name MyAKSCluster
    
  4. Create an Azure storage account with the following command, or referring to the tutorial. This is the target service that is connected to the AKS cluster and sample application interacts with.

    az storage account create \
        --resource-group MyResourceGroup \
        --name MyStorageAccount \
        --location eastus \
        --sku Standard_LRS
    
  5. Create an Azure container registry with the following command, or referring to the tutorial. The registry hosts the container image of the sample application, which will be consumed by the AKS pod definition.

    az acr create \
        --resource-group MyResourceGroup \
        --name MyRegistry \
        --sku Standard
    

    And enable anonymous pull so that AKS cluster can consume the images in the registry.

    az acr update \
        --resource-group MyResourceGroup \
        --name MyRegistry \
        --anonymous-pull-enabled
    
  6. Create a user-assigned managed identity with the following command, or referring to the tutorial. The user-assigned managed identity is used in service connection creation to enable workload identity for AKS workloads.

    az identity create \
        --resource-group MyResourceGroup \
        --name MyIdentity
    

Create service connection with Service Connector (preview)

Create a service connection between an AKS cluster and an Azure storage account using the Azure portal or the Azure CLI.

  1. Open your Kubernetes service in the Azure portal and select Service Connector from the left menu.

  2. Select Create and fill in the settings as shown below. Leave the other settings with their default values.

    Basics tab:

    Setting Choice Description
    Kubernetes namespace default The namespace where you need the connection in the cluster.
    Service type Storage - Blob The target service type.
    Connection name storage_conn Use the connection name provided by Service Connector or choose your own connection name.
    Subscription <MySubscription> The subscription for your Azure Blob Storage target service.
    Storage account <MyStorageAccount> The target storage account you want to connect to.
    Client type Python The code language or framework you use to connect to the target service.

    Authentication tab:

    Authentication Setting Choice Description
    Authentication type Workload Identity Service Connector authentication type.
    User assigned managed identity <MyIdentity> A user assigned managed identity is needed to enable workload identity.
  3. Once the connection has been created, the Service Connector page displays information about the new connection. Screenshot of the Azure portal, viewing kubernetes resources created by Service Connector.

Clone sample application

  1. Clone the sample repository:

    git clone https://github.com/Azure-Samples/serviceconnector-aks-samples.git
    
  2. Go to the repository's sample folder for Azure storage:

    cd serviceconnector-aks-samples/azure-storage-workload-identity
    

Build and push container image

  1. Build and push the images to your container registry using the Azure CLI az acr build command.

    az acr build --registry <MyRegistry> --image sc-demo-storage-identity:latest ./
    
  2. View the images in your container registry using the az acr repository list command.

    az acr repository list --name <MyRegistry> --output table
    

Run application and test connection

  1. Replace the placeholders in the pod.yaml file in the azure-storage-identity folder.

    • Replace <YourContainerImage> with the image name we build in last step, for example, <MyRegistry>.azurecr.io/sc-demo-storage-identity:latest.
    • Replace <ServiceAccountCreatedByServiceConnector> with the service account created by Service Connector after the connection creation. You may check the service account name in the Azure portal of Service Connector.
    • Replace <SecretCreatedByServiceConnector> with the secret created by Service Connector after the connection creation. You may check the secret name in the Azure portal of Service Connector.
  2. Deploy the pod to your cluster with kubectl apply command. Install kubectl locally using the az aks install-cli command if it isn't installed. The command creates a pod named sc-demo-storage-identity in the default namespace of your AKS cluster.

    kubectl apply -f pod.yaml
    
  3. Check the deployment is successful by viewing the pod with kubectl.

    kubectl get pod/sc-demo-storage-identity.
    
  4. Check connection is established by viewing the logs with kubectl.

    kubectl logs pod/sc-demo-storage-identity
    

Clean up resources

If you don't need to reuse the resources you've created in this tutorial, delete all the resources you created by deleting your resource group.

az group delete \
    --resource-group MyResourceGroup

Next steps

Read the following articles to learn more about Service Connector concepts and how it helps AKS connect to services.