Azure Native Clusters

Platform9 Managed Kubernetes has the ability to import existing Microsoft Azure AKS Clusters. Once imported you can view clusters created by Platform9 in Azure, AWS or BareOS, side-by-side with AKS Clusters It also can leverage Platform9 Management features such as our built-in Monitoring, the Helm3 service for deploying applications, and RBAC for fine-tuning and controlling user and service account permissions.

Platform9 provides native integration with Microsoft Azure to create Kubernetes clusters (non-AKS, leveraging VM instances) and manages the lifecycle of each component required to run a Kubernetes Cluster.

To create a Kubernetes cluster on Azure, you need to first create an Azure Cloud Provider within the PMK dashboard by providing Azure credentials. which are then securely stored in the Platform9 SaaS Management Plane.

The following items are required to create an Azure Cloud Provider:

FieldDescription
Tenant IDTenant ID of the service principal you created for PMK
Client IDClient ID of the service principal you created for PMK
Client SecretClient secret you created for PMK
Subscription IDID of the subscription that correlates to the service principal

Prerequisites

Below are the steps to get the required credentials for your Azure account:

  1. Create a Service Principal with Contributor Role
    1. A Service Principal in Azure is an identity for an external application to use to programmatically access Azure resources.

Create a new Service Principal in your Azure account that is associated to the Subscription ID you intend to use, and assign the Service Principal the Contributor role.

The Contributor role is required as Platform9 will create new resources in Azure, including:

  • Virtual Machines
  • Security Groups
  • Resource Groups
  • Virtual Networks
  • Scale Sets
  • Load Balancer

The service principal that was used to create the Cloud Provider must have access to the AKS Cluster as an Azure Kubernetes Service Cluster Admin Role.

For help creating a Service Principal and assigning the correct role, refer to the Microsoft Azure documentation: Create a Service Principal.

Assigning Contributor Role

  1. Obtain the Tenant and Client IDs for the Service Principal You will need to supply the Tenant and Client IDs of the Service Principal so that Platform9 can make programmatic sign-in requests to your Azure account.

How to find Tenant and Client IDs

  1. Create a new Client Secret Authentication to Azure requires a unique Secret, to generate a new secrete follow the Azure documentation for how to create a new client secret.
  2. Get your Azure Subscription ID, The Subscription ID is a GUID that uniquely identifies your Azure subscription. Follow the steps below to find your Subscription ID
  3. Log on to the Azure portal.
  4. In the left navigation panel, click Subscriptions.
  5. The list of your subscriptions is displayed along with the subscription ID.

Ensure that the Service Principal belongs to the Subscription ID you plan to use in Platform9. A mismatch between the Subscription ID and the Service Principal will result in a failure to execute API request to your Azure account

Supported Operating Systems

Regardless of what infrastructure or cloud provider you are creating the PMK clusters on, PMK supports the following operating systems for the nodes of those Kubernetes clusters.

  • CentOS 7+ (64-bit)
  • RHEL 7+ (64-bit)
  • Ubuntu LTS 18.04 (64-bit)
  • Ubuntu LTS 20.04 (64-bit)

Create Service Principal

  1. Login to the Azure Portal, and select "Azure Active Directory" from the dropdown at the top lefthand side of the page.
  1. From the "Default Directory" overview page, click on "+ Add", and select "App registration".
  1. From the "Register an application" page, enter the following information and make the following selections.
FieldDescriptionSuggested Value
NameThe user-facing display name for this application.Platform9
Supported account typesWho can use this application or access this API?

Default

  • Accounts in this organizational directory only (Default Directory only - Single tenant)
Redirect URI (optional)An authentication response is sent to this URI after successfully authenticating the user.N/A

The application is successfully created.

  1. Click on "Add a certificate or secret" next to "Client credentials" from the Overview page.
  2. Click on "+ New client secret", fill in the description, and select the expiry time.

The client secret/credentials are now successfully created.

The values from the Overview page (such as Client and Tenant ID), in combination with the Client secret value created above, may now be entered into the setup via the PMK dashboard. Your Subscription ID may separately be found under the "Subscriptions" page of the Azure Portal.

Assign App Role

  1. From the Azure Home page, click on "Subscriptions".
  1. Select the name of your subscription.
  1. Select "Access control (IAM)" from the lefthand side menu.
  2. Select the "Role assignments" tab, and click on "Add" at the top – choose "Add role assignment".
  1. Select "Contributor" from the list displayed under the "Role" tab, and then click "Next".
  1. Click "Select members", and search for "Platform9" (the name of the Azure AD app created earlier). Select the application, and then click on "Select".
  1. Click "Next".
  1. Click on "Review + assign" to complete.

The Contributor role is now successfully assigned to the Service Principal associated with the Azure AD app.

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard
  Last updated by Anmol Sachan