Skip to content

Commit 45921e5

Browse files
Merge pull request #250918 from rolyon/rolyon-rbac-roles-aks-cluster-monitoring-user
[Azure RBAC] Azure Kubernetes Service Cluster Monitoring User
2 parents b134bcc + eb7f9f3 commit 45921e5

File tree

1 file changed

+42
-0
lines changed

1 file changed

+42
-0
lines changed

articles/role-based-access-control/built-in-roles.md

Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -121,6 +121,7 @@ The following table provides a brief description of each built-in role. Click th
121121
> | [Azure Kubernetes Fleet Manager RBAC Reader](#azure-kubernetes-fleet-manager-rbac-reader) | Allows read-only access to see most objects in a namespace. It does not allow viewing roles or role bindings. This role does not allow viewing Secrets, since reading the contents of Secrets enables access to ServiceAccount credentials in the namespace, which would allow API access as any ServiceAccount in the namespace (a form of privilege escalation). Applying this role at cluster scope will give access across all namespaces. | 30b27cfc-9c84-438e-b0ce-70e35255df80 |
122122
> | [Azure Kubernetes Fleet Manager RBAC Writer](#azure-kubernetes-fleet-manager-rbac-writer) | Allows read/write access to most objects in a namespace. This role does not allow viewing or modifying roles or role bindings. However, this role allows accessing Secrets as any ServiceAccount in the namespace, so it can be used to gain the API access levels of any ServiceAccount in the namespace. Applying this role at cluster scope will give access across all namespaces. | 5af6afb3-c06c-4fa4-8848-71a8aee05683 |
123123
> | [Azure Kubernetes Service Cluster Admin Role](#azure-kubernetes-service-cluster-admin-role) | List cluster admin credential action. | 0ab0b1a8-8aac-4efd-b8c2-3ee1fb270be8 |
124+
> | [Azure Kubernetes Service Cluster Monitoring User](#azure-kubernetes-service-cluster-monitoring-user) | List cluster monitoring user credential action. | 1afdec4b-e479-420e-99e7-f82237c7c5e6 |
124125
> | [Azure Kubernetes Service Cluster User Role](#azure-kubernetes-service-cluster-user-role) | List cluster user credential action. | 4abbcc35-e782-43d8-92c5-2d3f1bd2253f |
125126
> | [Azure Kubernetes Service Contributor Role](#azure-kubernetes-service-contributor-role) | Grants access to read and write Azure Kubernetes Service clusters | ed7f3fbd-7b88-4dd4-9017-9adb7ce333f8 |
126127
> | [Azure Kubernetes Service RBAC Admin](#azure-kubernetes-service-rbac-admin) | Lets you manage all resources under cluster/namespace, except update or delete resource quotas and namespaces. | 3498e952-d568-435e-9b2c-8d77e338d7f7 |
@@ -5554,6 +5555,47 @@ List cluster admin credential action. [Learn more](../aks/control-kubeconfig-acc
55545555
}
55555556
```
55565557

5558+
### Azure Kubernetes Service Cluster Monitoring User
5559+
5560+
List cluster monitoring user credential action.
5561+
5562+
> [!div class="mx-tableFixed"]
5563+
> | Actions | Description |
5564+
> | --- | --- |
5565+
> | [Microsoft.ContainerService](resource-provider-operations.md#microsoftcontainerservice)/managedClusters/listClusterMonitoringUserCredential/action | List the clusterMonitoringUser credential of a managed cluster |
5566+
> | [Microsoft.ContainerService](resource-provider-operations.md#microsoftcontainerservice)/managedClusters/read | Get a managed cluster |
5567+
> | **NotActions** | |
5568+
> | *none* | |
5569+
> | **DataActions** | |
5570+
> | *none* | |
5571+
> | **NotDataActions** | |
5572+
> | *none* | |
5573+
5574+
```json
5575+
{
5576+
"assignableScopes": [
5577+
"/"
5578+
],
5579+
"description": "List cluster monitoring user credential action.",
5580+
"id": "/subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/1afdec4b-e479-420e-99e7-f82237c7c5e6",
5581+
"name": "1afdec4b-e479-420e-99e7-f82237c7c5e6",
5582+
"permissions": [
5583+
{
5584+
"actions": [
5585+
"Microsoft.ContainerService/managedClusters/listClusterMonitoringUserCredential/action",
5586+
"Microsoft.ContainerService/managedClusters/read"
5587+
],
5588+
"notActions": [],
5589+
"dataActions": [],
5590+
"notDataActions": []
5591+
}
5592+
],
5593+
"roleName": "Azure Kubernetes Service Cluster Monitoring User",
5594+
"roleType": "BuiltInRole",
5595+
"type": "Microsoft.Authorization/roleDefinitions"
5596+
}
5597+
```
5598+
55575599
### Azure Kubernetes Service Cluster User Role
55585600

55595601
List cluster user credential action. [Learn more](../aks/control-kubeconfig-access.md)

0 commit comments

Comments
 (0)