This action can be used to set cluster context before other actions like azure/k8s-deploy
and azure/k8s-create-secret
. Any kubectl commands (in script) can also be run subsequently in the workflow.
You must run Azure/login before this action.
Action inputs | Description |
---|---|
resource-group (Required) |
Resource group containing the AKS cluster |
cluster-name (Required) |
Name of the AKS cluster |
subscription |
Subscription tied to AKS cluster |
admin |
Get cluster admin credentials. Values: true or false |
use-kubelogin |
Allows non-admin users to use the Action via kubelogin |
- uses: azure/login@v1
with:
client-id: ${{ secrets.AZURE_CLIENT_ID }}
tenant-id: ${{ secrets.AZURE_TENANT_ID }}
subscription-id: ${{ secrets.AZURE_SUBSCRIPTION_ID }}
- uses: azure/aks-set-context@v3
with:
resource-group: '<resource group name>'
cluster-name: '<cluster name>'
- uses: azure/login@v1
with:
creds: ${{ secrets.AZURE_CREDENTIALS }}
- uses: azure/aks-set-context@v3
with:
resource-group: '<resource group name>'
cluster-name: '<cluster name>'
kubelogin
is at the core of the non-admin user scenario. For more information on kubelogin
, refer to the documentation here.
To run this Action as a non-admin user, you must first install kubelogin
. To set up kubelogin
, you may use the following:
- name: Set up kubelogin for non-interactive login
run: |
curl -LO https://github.com/Azure/kubelogin/releases/download/v0.0.9/kubelogin-linux-amd64.zip
sudo unzip -j kubelogin-linux-amd64.zip -d /usr/local/bin
rm -f kubelogin-linux-amd64.zip
kubelogin --version
If you are executing this Action as a non-admin user, you need to toggle the optional use-kubelogin
Action input to true
for it to work.
- uses: azure/login@v1
with:
client-id: ${{ secrets.AZURE_CLIENT_ID }}
tenant-id: ${{ secrets.AZURE_TENANT_ID }}
subscription-id: ${{ secrets.AZURE_SUBSCRIPTION_ID }}
- uses: azure/aks-set-context@v3
with:
resource-group: '<resource group name>'
cluster-name: '<cluster name>'
admin: 'false'
use-kubelogin: 'true'
- uses: azure/login@v1
with:
creds: ${{ secrets.AZURE_CREDENTIALS }}
- uses: azure/aks-set-context@v3
with:
resource-group: '<resource group name>'
cluster-name: '<cluster name>'
admin: 'false'
use-kubelogin: 'true'
This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.opensource.microsoft.com.
When you submit a pull request, a CLA bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.
This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.
aks-set-context is an open source project that is not covered by the Microsoft Azure support policy. Please search open issues here, and if your issue isn't already represented please open a new one. The project maintainers will respond to the best of their abilities.