You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
= Finalizing user-managed encryption after installation
12
29
If you installed {product-title} using a user-managed encryption key, you can complete the installation by creating a new storage class and granting write permissions to the Azure cluster resource group.
13
30
14
31
.Procedure
32
+
15
33
. Obtain the identity of the cluster resource group used by the installer:
16
34
.. If you specified an existing resource group in `install-config.yaml`, obtain its Azure identity by running the following command:
17
35
+
@@ -63,6 +81,7 @@ $ az identity show -g <cluster_resource_group> \// <1>
63
81
<1> Specifies the name of the cluster resource group created by the installation program.
64
82
<2> Specifies the name of the cluster service principal created by the installation program.
65
83
The identity is in the format of `12345678-1234-1234-1234-1234567890`.
84
+
ifdef::azure-gov[]
66
85
. Create a role assignment that grants the cluster service principal `Contributor` privileges to the disk encryption set by running the following command:
67
86
+
68
87
[source,terminal]
@@ -73,6 +92,20 @@ $ az role assignment create --assignee <cluster_service_principal_id> \// <1>
73
92
----
74
93
<1> Specifies the ID of the cluster service principal obtained in the previous step.
75
94
<2> Specifies the ID of the disk encryption set.
95
+
endif::azure-gov[]
96
+
ifdef::azure-public[]
97
+
. Create a role assignment that grants the cluster service principal necessary privileges to the disk encryption set by running the following command:
98
+
+
99
+
[source,terminal]
100
+
----
101
+
$ az role assignment create --assignee <cluster_service_principal_id> \// <1>
102
+
--role <privileged_role> \// <2>
103
+
--scope <disk_encryption_set_id> \// <3>
104
+
----
105
+
<1> Specifies the ID of the cluster service principal obtained in the previous step.
106
+
<2> Specifies the Azure role name. You can use the `Contributor` role or a custom role with the necessary permissions.
107
+
<3> Specifies the ID of the disk encryption set.
108
+
endif::azure-public[]
76
109
+
77
110
. Create a storage class that uses the user-managed disk encryption set:
78
111
.. Save the following storage class definition to a file, for example `storage-class-definition.yaml`:
Copy file name to clipboardExpand all lines: modules/installation-azure-permissions.adoc
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,4 @@
11
11
* `User Access Administrator`
12
12
* `Owner`
13
13
14
-
To set roles on the Azure portal, see the
15
-
link:https://docs.microsoft.com/en-us/azure/role-based-access-control/role-assignments-portal[Manage access to Azure resources using RBAC and the Azure portal]
16
-
in the Azure documentation.
14
+
To set roles on the Azure portal, see the link:https://docs.microsoft.com/en-us/azure/role-based-access-control/role-assignments-portal[Manage access to Azure resources using RBAC and the Azure portal] in the Azure documentation.
@@ -22,6 +28,12 @@ Because {product-title} and its installation program create Microsoft Azure reso
22
28
23
29
* Install or update the link:https://docs.microsoft.com/en-us/cli/azure/install-azure-cli-yum?view=azure-cli-latest[Azure CLI].
24
30
* Your Azure account has the required roles for the subscription that you use.
31
+
ifdef::ipi[]
32
+
* If you want to use a custom role, you have created a link:https://learn.microsoft.com/en-us/azure/role-based-access-control/custom-roles[custom role] with the required permissions listed in the _Required Azure permissions for installer-provisioned infrastructure_ section.
33
+
endif::ipi[]
34
+
ifdef::upi[]
35
+
* If you want to use a custom role, you have created a link:https://learn.microsoft.com/en-us/azure/role-based-access-control/custom-roles[custom role] with the required permissions listed in the _Required Azure permissions for user-provisioned infrastructure_ section.
36
+
endif::upi[]
25
37
26
38
.Procedure
27
39
@@ -167,6 +179,7 @@ endif::[]
167
179
168
180
. Record the `tenantId` and `id` parameter values from the output. You need these values during the {product-title} installation.
169
181
182
+
ifdef::ash[]
170
183
. Create the service principal for your account:
171
184
+
172
185
[source,terminal]
@@ -181,6 +194,35 @@ $ az ad sp create-for-rbac --role Contributor --name <service_principal> \ <1>
181
194
[source,terminal]
182
195
----
183
196
Creating 'Contributor' role assignment under scope '/subscriptions/<subscription_id>'
197
+
The output includes credentials that you must protect. Be sure that you do not
198
+
include these credentials in your code or check the credentials into your source
199
+
control. For more information, see https://aka.ms/azadsp-cli
0 commit comments