Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

AKS Installer: Support Azure Managed Identity instead of using AD Service Principal #66

Open
MitchellGerdisch opened this issue Jun 17, 2022 · 2 comments
Assignees
Labels
kind/enhancement Improvements or new features

Comments

@MitchellGerdisch
Copy link
Contributor

Hello!

  • Vote on this issue by adding a 👍 reaction
  • If you want to implement this feature, comment to let us know (we'll work with you on design, scheduling, etc.)

Issue details

Some users do not have permission to create AD service principals and instead the organization uses Azure managed identity.
The AKS installation should support Azure managed identity as an option.

Affected area/feature

AKS Self-Hosted Installer

@MitchellGerdisch MitchellGerdisch added kind/enhancement Improvements or new features needs-triage Needs attention from the triage team and removed needs-triage Needs attention from the triage team labels Jun 17, 2022
@MitchellGerdisch MitchellGerdisch self-assigned this Jun 17, 2022
@techgeek03
Copy link

At the moment the self-hosted installers for AKS use Azure AD service principal as identity. Service principals have several known limitations:

  • They need to be manually provisioned; and as such require permissions in Azure AD
  • The service principal passwords expires and as such it need to be renewed which posses operational challenge.
    Instead the AKS cluster can be provisioned with managed identity. https://docs.microsoft.com/en-us/azure/aks/use-managed-identity

@phillipedwards
Copy link
Contributor

@MitchellGerdisch this seems like a good idea, however, is it clear how the Pulumi Service would assume/obtain the managed credentials needed to interact w/ Azure services? Currently, those values are being passed to the API deployment.

My concern is the managed credentials need to be refreshed periodically and the API would need to be aware of that.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/enhancement Improvements or new features
Projects
None yet
Development

No branches or pull requests

3 participants