You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/installation-azure-finalizing-encryption.adoc
+34-1Lines changed: 34 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,6 +41,39 @@ $ az role assignment create --role "<privileged_role>" \// <1>
41
41
<1> Specifies an Azure role that has read/write permissions to the disk encryption set. You can use the `Owner` role or a custom role with the necessary permissions.
42
42
<2> Specifies the identity of the cluster resource group.
43
43
+
44
+
. Obtain the `id` of the disk encryption set you created prior to installation by running the following command:
45
+
+
46
+
[source,terminal]
47
+
----
48
+
$ az disk-encryption-set show -n <disk_encryption_set_name> \// <1>
49
+
--resource-group <resource_group_name> <2>
50
+
----
51
+
<1> Specifies the name of the disk encryption set.
52
+
<2> Specifies the resource group that contains the disk encryption set.
53
+
The `id` is in the format of `"/subscriptions/.../resourceGroups/.../providers/Microsoft.Compute/diskEncryptionSets/..."`.
54
+
+
55
+
. Obtain the identity of the cluster service principal by running the following command:
56
+
+
57
+
[source,terminal]
58
+
----
59
+
$ az identity show -g <cluster_resource_group> \// <1>
60
+
-n <cluster_service_principal_name> \// <2>
61
+
--query principalId --out tsv
62
+
----
63
+
<1> Specifies the name of the cluster resource group created by the installation program.
64
+
<2> Specifies the name of the cluster service principal created by the installation program.
65
+
The identity is in the format of `12345678-1234-1234-1234-1234567890`.
66
+
. Create a role assignment that grants the cluster service principal `Contributor` privileges to the disk encryption set by running the following command:
67
+
+
68
+
[source,terminal]
69
+
----
70
+
$ az role assignment create --assignee <cluster_service_principal_id> \// <1>
71
+
--role 'Contributor' \//
72
+
--scope <disk_encryption_set_id> \// <2>
73
+
----
74
+
<1> Specifies the ID of the cluster service principal obtained in the previous step.
75
+
<2> Specifies the ID of the disk encryption set.
76
+
+
44
77
. Create a storage class that uses the user-managed disk encryption set:
45
78
.. Save the following storage class definition to a file, for example `storage-class-definition.yaml`:
0 commit comments