Panel | ||||||
---|---|---|---|---|---|---|
| ||||||
Note
|
For Existing Kubernetes Cluster
...
If Authentication and Authorization is set to Microsoft Entra ID authentication with Azure RBAC (AAD is enabled)
No action is required for a dedicated cluster.
For shared cluster, you must have already created namespace and KyvosMI with Azure Kubernetes Service RBAC Admin on the namespace level.
Download kyvos-compute-worker-disk-class.yaml file and execute the kubectl apply –f kyvos-compute-worker-disk-class.yaml command from the user/MI which has Admin privileges on AKS Kubernetes cluster. This is to create storage class. If required, you can update the tags in the file by passing comma-separated values.
...
To configure as a dedicated cluster
Assign Azure Kubernetes Service RBAC Cluster Admin to kyvos MI on AKSKubernetes .
Assign Virtual Machine Contributor on managed resource group to Kyvos MI.
Storage Blob Data Contributor to AKS Kubernetes Managed Identity on bucket.
To configure as a shared Cluster:
Either namespace should be already created or provide Azure Kubernetes Service RBAC Cluster Admin permission to kyvos MI on AKSKyvos Managed Identity on Kubernetes.
Download kyvos-compute-worker-disk-class.yaml file and execute the kubectl apply –f kyvos-compute-worker-disk-class.yaml command from the user/MI which has Admin privileges on AKS Kubernetes cluster. This is to create storage class. If required, you can update the tags in the file by passing comma-separated values.
If namespace is already created, then Kyvos Managed Identity must have Azure Kubernetes Service RBAC Admin on namespace and Azure Kubernetes Service Cluster User Role on AKSKubernetes .
Assign Reader on managed resource group to Kyvos Managed Identity.
Storage Blob Data Contributor to AKS Kubernetes Managed Identity on bucket.
...
To configure as a dedicated Cluster
Assign Contributor to Kyvos MI on AKSKubernetes .
Assign Virtual Machine Contributor on managed resource group to Kyvos MI.
Storage Blob Data Contributor to AKS Kubernetes Managed Identity on bucket.
To configure as a shared Cluster
If namespace is already created, then Kyvos MI must have Azure Kubernetes Service Cluster User Role on AKSKubernetes .
Assign Reader on AKS Kubernetes to Kyvos MI.
Assign Reader on managed resource group to Kyvos MI.
Storage Blob Data Contributor to AKS Kubernetes MI on bucket.
Panel | ||||||
---|---|---|---|---|---|---|
| ||||||
Note If scaling is enabled in any of the following cases of shared AKS Kubernetes cluster, the following roles must be assigned to Kyvos MI Managed Identity on the AKS Kubernetes cluster.
|
Enhanced Security
AKS Kubernetes Subnet must be allowed in networking rules of Kyvos storage account.
AKS Kubernetes Subnet must be allowed in networking rules of Kyvos key Vault.