Skip to content

Commit fc1e1d3

Browse files
Merge pull request #294358 from eak13/main
Updates to add firewall info for SA & KV
2 parents 8ef97ef + 1e54861 commit fc1e1d3

File tree

1 file changed

+12
-0
lines changed

1 file changed

+12
-0
lines changed

articles/operator-nexus/howto-cluster-managed-identity-user-provided-resources.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,9 @@ The following steps should be followed for using UAMIs with Nexus Clusters and a
6262
1. Create a storage account, or identify an existing storage account that you want to use. See [Create an Azure storage account](/azure/storage/common/storage-account-create?tabs=azure-portal).
6363
1. Create a blob storage container in the storage account. See [Create a container](/azure/storage/blobs/storage-quickstart-blobs-portal#create-a-container).
6464
1. Assign the `Storage Blob Data Contributor` role to users and the UAMI which need access to the run-\* command output. See [Assign an Azure role for access to blob data](/azure/storage/blobs/assign-azure-role-data-access?tabs=portal).
65+
1. To limit access to the Storage Account to a select set of IP or virtual networks, see [Configure Azure Storage firewalls and virtual networks](/azure/storage/common/storage-network-security?tabs=azure-portal).
66+
1. The IPs for all users executing run-\* commands need to be added to the Storage Account's `Virtual Networks` and/or `Firewall` lists.
67+
1. Ensure `Allow Azure services on the trusted services list to access this storage account.` under `Exceptions` is selected.
6568

6669
#### Log Analytics Workspaces setup
6770

@@ -81,6 +84,9 @@ The following steps should be followed for using UAMIs with Nexus Clusters and a
8184
1. Assign access to: **User, group, or service principal**.
8285
1. Select **Member**: AFOI-NC-MGMT-PME-PROD application.
8386
1. Review and assign.
87+
1. To limit access to the Key Vault to a select set of IP or virtual networks, see [Configure Azure Key Vault firewalls and virtual networks](/azure/key-vault/general/network-security?WT.mc_id=Portal-Microsoft_Azure_KeyVault).
88+
1. The IPs for all users requiring access to the Key Vault need to be added to the Key Vault's `Virtual Networks` and/or `Firewall` lists.
89+
1. Ensure the `Allow trusted Microsoft services to bypass this firewall.` under `Exceptions` is selected.
8490

8591
### Create or update the Nexus Cluster to use User Assigned Managed Identities and user provided resources
8692

@@ -289,6 +295,9 @@ System-assigned identity example:
289295
1. Create a storage account, or identify an existing storage account that you want to use. See [Create an Azure storage account](/azure/storage/common/storage-account-create?tabs=azure-portal).
290296
1. Create a blob storage container in the storage account. See [Create a container](/azure/storage/blobs/storage-quickstart-blobs-portal#create-a-container).
291297
1. Assign the `Storage Blob Data Contributor` role to users and the SAMI which need access to the run-\* command output. See [Assign an Azure role for access to blob data](/azure/storage/blobs/assign-azure-role-data-access?tabs=portal).
298+
1. 1. To limit access to the Storage Account to a select set of IP or virtual networks, see [Configure Azure Storage firewalls and virtual networks](/azure/storage/common/storage-network-security?tabs=azure-portal).
299+
1. The IPs for all users executing run-\* commands need to be added to the Storage Account's `Virtual Networks` and/or `Firewall` lists.
300+
1. Ensure `Allow Azure services on the trusted services list to access this storage account.` under `Exceptions` is selected.
292301

293302
#### Log Analytics Workspaces setup
294303

@@ -301,6 +310,9 @@ System-assigned identity example:
301310
1. Enable the Key Vault for Role Based Access Control (RBAC). See [Enable Azure RBAC permissions on Key Vault](/azure/key-vault/general/rbac-guide?tabs=azure-cli#enable-azure-rbac-permissions-on-key-vault).
302311
1. Assign the `Operator Nexus Key Vault Writer Service Role (Preview)` role to the SAMI for the Key Vault. See [Assign role](/azure/key-vault/general/rbac-guide?tabs=azure-cli#assign-role).
303312
1. The role definition ID for the Operator Nexus Key Vault Writer Service Role is `44f0a1a8-6fea-4b35-980a-8ff50c487c97`. This format is required if using the Azure command line to do the role assignment.
313+
1. To limit access to the Key Vault to a select set of IP or virtual networks, see [Configure Azure Key Vault firewalls and virtual networks](/azure/key-vault/general/network-security?WT.mc_id=Portal-Microsoft_Azure_KeyVault).
314+
1. The IPs for all users requiring access to the Key Vault need to be added to the Key Vault's `Virtual Networks` and/or `Firewall` lists.
315+
1. Ensure the `Allow trusted Microsoft services to bypass this firewall.` under `Exceptions` is selected.
304316

305317
### Update the Cluster with the user provided resources information
306318

0 commit comments

Comments
 (0)