...
Panel | ||||||
---|---|---|---|---|---|---|
| ||||||
Note |
Permission required by Kyvos Managed Identity
Panel | ||||||
---|---|---|---|---|---|---|
| ||||||
Important These are only required when the AKS cluster is created externally, and you want to configure it post-deployment/post upgrade) from Kyvos Manager. |
Case 1: Dedicated Azure Kubernetes Service (AKS) Cluster
Built-in Azure Kubernetes Service Cluster User Role on AKS cluster
Built-in Reader on the AKS cluster
Built-in Virtual Machine Contributor on Managed Resource Group
Microsoft.ContainerService/managedClusters/agentPools/write" on the AKS cluster
Microsoft.ContainerService/managedClusters/agentPools/read" on the AKS cluster
Microsoft.ContainerService/managedClusters/agentPools/delete" on the AKS cluster
Case 2: Shared AKS Cluster
Permission is the same as the dedicated AKS Clustercluster.
Both Namespaces (compute and monitoring) must be already created.created.
Download view-nodes.yaml file, update an object ID of Kyvos Managed Identity and execute the kubectl apply –f view-nodes.yaml command from the user/Managed Identity which has Admin privileges on the AKS cluster. This is to provide get and list node permission.
Download kyvos-compute-worker-disk-class.yaml file and execute the kubectl apply –f kyvos-compute-worker-disk-class.yaml command from the user/MI which has Admin privileges on AKS cluster. This is to create storage class. If required, you can update the tags in the file by passing comma-separated values.
Case 3: Dedicated Node pool
Built-in Azure Kubernetes Service Cluster User Role on the AKS cluster
Built-in Reader on the AKS cluster
Built-in Virtual Machine Contributor on VMSS of Node pool
Microsoft.ContainerService/managedClusters/agentPools/write" on the AKS cluster
Microsoft.ContainerService/managedClusters/agentPools/read" on the AKS cluster
Microsoft.ContainerService/managedClusters/agentPools/delete" on AKS
Case 4: Shared Node pool
Built-in Azure Kubernetes Service Cluster User Role on AKS
Built-in Reader on AKS
the AKS cluster
Permission required by Kubernetes Managed Identity
Built-in Managed Identity Operator on this Managed Identity itself
(Note: this is required to create on AKS cluster if it is created externally)Built-in Storage Blob Data Contributor on the Kyvos storage account
Built-in Reader on the AKS cluster
Create Access policy to get secret on the Kyvos key Vault
In case of Enhanced Security
AKS Subnet must be allowed in networking rules of Kyvos storage account.
AKS Subnet must be allowed in networking rules of Kyvos key Vault.