-
Notifications
You must be signed in to change notification settings - Fork 3.3k
Closed
Labels
AADAKSaz aks/acs/openshiftaz aks/acs/openshiftService AttentionThis issue is responsible by Azure service team.This issue is responsible by Azure service team.customer-reportedIssues that are reported by GitHub users external to the Azure organization.Issues that are reported by GitHub users external to the Azure organization.needs-author-feedbackMore information is needed from author to address the issue.More information is needed from author to address the issue.
Description
Describe the bug
Failed to create aks cluster using command line az aks create -n my-cluster -g test
Instead the cli fails to pull the service principal credentials
Operation failed with status: 'Bad Request'. Details: The credentials in ServicePrincipalProfile were invalid. Please see https://aka.ms/aks-sp-help for more details. (Details: adal: Refresh request failed. Status Code = '400'. Response body: {"error":"unauthorized_client","error_description":"AADSTS700016: Application with identifier 'f4b3caa9-defb-4ada-b190-e8422327afbb' was not found in the directory '599a411f-b08b-45fe-8545-623369f42d16'. This can happen if the application has not been installed by the administrator of the tenant or consented to by any user in the tenant. You may have sent your authentication request to the wrong tenant.\r\nTrace ID: bb906908-bf98-46ad-ad5f-6262bd779100\r\nCorrelation ID: b5bb293a-d4be-43be-9a86-180b51515b4b\r\nTimestamp: 2019-06-06 18:45:03Z","error_codes":[700016],"timestamp":"2019-06-06 18:45:03Z","trace_id":"bb906908-bf98-46ad-ad5f-6262bd779100","correlation_id":"b5bb293a-d4be-43be-9a86-180b51515b4b","error_uri":"https://login.microsoftonline.com/error?code=700016"})
To Reproduce
Run az aks create -n my-cluster -g test
Expected behavior
A cluster is created
Environment summary
Linux-4.9.87-linuxkit-aufs-x86_64-with-debian-buster-sid
Python 3.6.5
Shell: bash
azure-cli 2.0.66
Additional context
https://docs.microsoft.com/en-us/azure/aks/kubernetes-service-principal#automatically-create-and-use-a-service-principal
The documentation clearly states that a principal should be created when one is not passed in.
In this case, a SP is being created, and I can see that after in the App Registrations panel, but yet the command is still failing, leaving me with a SP that appears to be useless
kauphylover, nemo-xue, tpamula, sayotte, tirthbodawala and 4 more
Metadata
Metadata
Assignees
Labels
AADAKSaz aks/acs/openshiftaz aks/acs/openshiftService AttentionThis issue is responsible by Azure service team.This issue is responsible by Azure service team.customer-reportedIssues that are reported by GitHub users external to the Azure organization.Issues that are reported by GitHub users external to the Azure organization.needs-author-feedbackMore information is needed from author to address the issue.More information is needed from author to address the issue.