-
Notifications
You must be signed in to change notification settings - Fork 255
mic pod has insufficient permissions on AKS #38
Comments
Thank you, for trying out pod identity and reporting the issue. I will try to repro this issue in house. Meanwhile, in order to rule out issues relating to identity being in a different resource group - Is it possible to retry this with an identity created with the same resource group as that of nodes - MC_k8s-test_clusterFrank_eastus ? |
I recreated the Azure Identity 'podId' in the Resource Group 'MC_k8s-test_clusterFrank_eastus'.
Side note: 'MC_k8s-test_clusterFrank_eastus' was automatically created when I provisioned an AKS cluster in Resource Group 'k8s-test'. mic pod now successfully binds the identity.
|
More info on the relationship between identities and resource groups. The following identity (in the same RG as the AKS cluster) caused the error above. Obviously I'd prefer to create identities in the 'k8s-test' RG rather than the automatically provisioned RG 'MC_k8s-test_clusterFrank_eastus'.
|
It took me a while to understand the documentation on how to use and deploy this repository. I've made a tutorial: Azure CLI and kubectl to use aad-pod-identity in AKS |
@xtellurian This is fantastic! any chance you can PR it into this repo? Would be great to have it along with the rest of stuff like |
Good idea |
@khenidak can you expand on what you mean by |
I have tested user assigned identity in AKS RG (insetad of MC_* RG) and it is working fine so not sure what is the exact issue referred here. |
Root cause could have been related to the service principal for AKS, or perhaps another permissions issue in Azure. |
I had the same issue. I tried to test the application-gateway-kubernetes-ingress. The project provides a detailed installation description and uses aadpodidentity as well. When creating the UserAssignedIdentity within the cluster resource group the assignment doesn't work. Only when the identity is created inside MC_*RG the assignment works. |
@AndreasM009 - The steps to enable the scenario when the identity is in a different resource group was added to the Readme with #48 Can you please confirm that even after the running the steps here: https://github.com/Azure/aad-pod-identity/blob/master/README.md#providing-required-permissions-for-mic you are still having the issue. |
@kkmsft it works now, I had some problems with my service principal. thx. |
I have met the same issue. The identity needs to be the same resource group of MC-XXX should be stated explicitly in document https://github.com/Azure/aad-pod-identity/blob/master/README.md |
Let me premise this by saying I followed the README and got into this position. The root cause may be a bug, but more likely is missing or misleading documentation.
ENV:
Deployed the Infra and the demo, plus the bindings, as described in the README.
Looks like the MIC pod is unable to assign the identity.
Cannot perform action
Microsoft.ManagedIdentity/userAssignedIdentities/assign/action
.Do these permissions need to be set somewhere?
The text was updated successfully, but these errors were encountered: