diff --git a/cluster-autoscaler/cloudprovider/azure/test/Makefile b/cluster-autoscaler/cloudprovider/azure/test/Makefile index b49a6044325e..185247a08be3 100644 --- a/cluster-autoscaler/cloudprovider/azure/test/Makefile +++ b/cluster-autoscaler/cloudprovider/azure/test/Makefile @@ -16,9 +16,9 @@ ARTIFACTS?=_artifacts .PHONY: test-e2e test-e2e: build-e2e go run github.com/onsi/ginkgo/v2/ginkgo -v --trace --output-dir "$(ARTIFACTS)" --junit-report="junit.e2e_suite.1.xml" e2e -- \ - -resource-group="$$(KUBECONFIG= kubectl get managedclusters -o jsonpath='{.items[0].status.nodeResourceGroup}')" \ - -cluster-name="$$(KUBECONFIG= kubectl get cluster -o jsonpath='{.items[0].metadata.name}')" \ - -client-id="$$(KUBECONFIG= kubectl get userassignedidentities -o jsonpath='{.items[0].status.clientId}')" \ + -resource-group="$$(KUBECONFIG= kubectl get managedclusters -n default -o jsonpath='{.items[0].status.nodeResourceGroup}')" \ + -cluster-name="$$(KUBECONFIG= kubectl get cluster -n default -o jsonpath='{.items[0].metadata.name}')" \ + -client-id="$$(KUBECONFIG= kubectl get userassignedidentities -n default -o jsonpath='{.items[0].status.clientId}')" \ -cas-namespace="$(CLUSTER_AUTOSCALER_NAMESPACE)" \ -cas-serviceaccount-name="$(CLUSTER_AUTOSCALER_SERVICEACCOUNT_NAME)" \ -cas-image-repository="$(IMAGE)-$(GOARCH)" \ diff --git a/cluster-autoscaler/cloudprovider/azure/test/templates/cluster-template-prow-aks-aso-cluster-autoscaler.yaml b/cluster-autoscaler/cloudprovider/azure/test/templates/cluster-template-prow-aks-aso-cluster-autoscaler.yaml index fc17628ee2bd..c32e2192f5bf 100644 --- a/cluster-autoscaler/cloudprovider/azure/test/templates/cluster-template-prow-aks-aso-cluster-autoscaler.yaml +++ b/cluster-autoscaler/cloudprovider/azure/test/templates/cluster-template-prow-aks-aso-cluster-autoscaler.yaml @@ -266,6 +266,7 @@ apiVersion: v1 kind: Secret metadata: name: ${ASO_CREDENTIAL_SECRET_NAME} + namespace: default stringData: AZURE_SUBSCRIPTION_ID: ${AZURE_SUBSCRIPTION_ID} AZURE_TENANT_ID: ${AZURE_TENANT_ID} @@ -276,6 +277,7 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: capz-${CLUSTER_NAME} + namespace: default labels: cluster.x-k8s.io/aggregate-to-capz-manager: "true" rules: