Azure Kubernetes Service does not allow azure CNI networking

I have been trying to create an Azure Kubernetes Cluster with azure CNI networking. I am trying to use one of my existing vnet and subnets that I created. But it seems that the account that has been provided for the azure playground does not have enough permission to use the existing vnet.

Exact error is - The subnet does not have necessary role assignment for the cluster and you don’t have the necessary permission to perform the “Microsoft.Authorization/roleAssignments/write” action to add one.

Azure CNI is a important topic that is used in most cases in real world scenarios. It’ll be a great help for practice if this issue is solved.

@raymond.baoly we need your intervention here. Thanks in advance.

Hi @crazylinux

Have you tried to read this one? certified-kubernetes-administrator-course/managed-clusters/aks/console at master · kodekloudhub/certified-kubernetes-administrator-course · GitHub

Hi @raymond.baoly,

I went through the docs. As I pointed out earlier, the doc also uses the kubenet for networking of the AKS cluster.

Ref: https://github.com/kodekloudhub/certified-kubernetes-administrator-course/blob/master/managed-clusters/aks/console/images/06a-networking.png

What I am trying to convey is- In real world scenarios most of the AKS clusters are built using Azure CNI to incorporate existing vnets and other networking requirements. So it’ll be super helpful if playground allows to use Azure CNI for networking (currently not supported).

Please check with the team if the same can be allowed. Thanks.