Permission for Scaling
Note
The role permissions may not update instantly. Changes may take 2-5 minutes to sync and apply.
For Azure:
If the Resource Group of the Virtual Network is other than Kyvos, you must add custom roles with the required permissions, as mentioned below in the (Scaling Permissions) table. If Virtual Network is in the same Resource Group as Kyvos, no additional permission is required for scaling nodes as Azure Managed Identity has Contributor access rights to all resources of the given Resource Group.
While creating a custom role, add the Resource IDs for the following services in the assignable scope:
Application Gateway
Virtual Network
Network Security Group
Once the custom role is created, it must be assigned to each of the above-listed services.
 Functionality | AWS (IAM Role) | AZURE | GCP |
Increase Node | ec2:GetLaunchTemplateData |
NOTE: Applicable only when Virtual Network is in another Resource Group. | compute.subnetworks.use compute.instances.create |
Decrease Node | ec2:DeleteLaunchTemplate |
NOTE: Applicable only when Virtual Network is in another Resource Group. | compute.subnetworks.use compute.instances.delete |
Increase Disk | ec2:CreateVolume | Â Contributor Access | compute.disks.create |
Decrease Disk | ec2:DetachVolume | Â Â Contributor Access | compute.instances.detachDisk |
Load Balancer Entry Addition | TargetGroup elasticloadbalancing:DescribeTargetGroups elasticloadbalancing:RegisterTargets | Â Microsoft.Network/applicationGateways/write | Â Instance Group compute.instanceGroups.get |
Load Balancer Entry Deletion | Target Group elasticloadbalancing:DescribeTargetGroups elasticloadbalancing:DeregisterTargets | Â Microsoft.Network/applicationGateways/write (applicable only for Web Portal) | Â Instance Group compute.instanceGroups.get |
Health Check  | Target Group Health Check Probe elasticloadbalancing:ModifyTargetGroup |   Contributor Access | Instance Group Health Check compute.instanceGroups.get |
Read Also:
Copyright Kyvos, Inc. All rights reserved.