You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/service-fabric/managed-cluster-deny-assignment.md
+45-5Lines changed: 45 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,27 +6,67 @@ ms.author: tomcassidy
6
6
author: tomvcassidy
7
7
ms.service: service-fabric
8
8
services: service-fabric
9
-
ms.date: 08/18/2023
9
+
ms.date: 07/17/2024
10
10
---
11
11
12
12
# Deny assignment policy for Service Fabric managed clusters
13
13
14
-
Deny assignment policies for Service Fabric managed clusters enable customers to protect the resources of their clusters. Deny assignments attach a set of deny actions to a user, group, or service principal at a particular scope to deny access. Limiting access to certain actions can help users from inadvertently damaging their clusters when they delete, deallocate restart, or reimage their clusters' scale set directly in the infrastructure resource group, which can cause the resources of the cluster to be unsynchronized with the data in the managed cluster.
14
+
Deny assignment policies for Service Fabric managed clusters enable customers to protect their clusters' resources. Limiting access to certain actions can help users prevent inadvertent damage to their clusters when they delete, deallocate, restart, or reimage their clusters' scale sets. These actions, when done directly in the infrastructure resource group, can cause the resources of the cluster to desynchronize with the data in the cluster.
15
15
16
-
All actions that are related to managed clusters should be done through the managed cluster resource APIs instead of directly against the infrastructure resource group. Using the resource APIs ensures the resources of the cluster are synchronized with the data in the managed cluster.
16
+
Deny assignments deny access by attaching a set of deny actions to a user, group, or service principal at a particular scope. You can learn more about deny assignments in the [Azure role-based access control (RBAC) documentation](../role-based-access-control/deny-assignments.md).
17
17
18
-
This feature ensures that the correct, supported APIs are used when performing delete operations to avoid any errors.
18
+
This article pertains to Service Fabric managed clusters, but we make callouts when the information pertains to classic clusters as well.
19
19
20
-
You can learn more about deny assignments in the [Azure role-based access control (RBAC) documentation](../role-based-access-control/deny-assignments.md).
20
+
## Proper actions
21
+
22
+
All actions related to managed clusters should be done through the managed cluster resource APIs instead of directly against the infrastructure resource group. Using the resource APIs ensures the resources of the cluster are synchronized with the data in the managed cluster.
23
+
24
+
See the [Best practices section](#best-practices) for guidance on what tools to use to go through the proper resource APIs.
25
+
26
+
## Blocked actions
27
+
28
+
The following actions are blocked when using managed clusters and don't apply to classic clusters.
The following are some best practices to minimize the threat of desyncing your cluster's resources:
49
+
25
50
* Instead of deleting virtual machine scale sets directly from the managed resource group, use NodeType level APIs to delete the NodeType or virtual machine scale set. Options include the Node blade on the Azure portal and [Azure PowerShell](/powershell/module/az.servicefabric/remove-azservicefabricmanagednodetype).
26
51
* Use the correct APIs to restart or reimage your scale sets:
27
52
*[Virtual machine scale set restarts](/powershell/module/az.servicefabric/restart-azservicefabricmanagednodetype)
28
53
*[Virtual machine scale set reimage](/powershell/module/az.servicefabric/set-azservicefabricmanagednodetype)
29
54
55
+
When managing resources in managed clusters, use ARM or ARM-backed tools to ensure the use of the proper resource APIs.
56
+
57
+
| Utility | ARM or ARM-backed |
58
+
| - | - |
59
+
|[ARM and ARM templates](/azure/templates/microsoft.servicefabric/clusters?pivots=deployment-language-arm-template)| Yes |
> When managing resources in a **classic cluster** that were *created* by ARM or ARM-backed tools, continue to use those tools. There's risk of error when modifying the configuration of resources created in ARM with a non-ARM tool (for example, using Service Fabric PowerShell to update or delete a resource created in ARM).
69
+
30
70
## Next steps
31
71
32
72
* Learn more about [granting permission to access resources on managed clusters](how-to-managed-cluster-grant-access-other-resources.md)
0 commit comments