Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

1. Locate the service principal ID of the Azure App added to Cloudaware. Log in to Azure Portal → Azure Active Directory → Enterprise applications → select the app. Copy and save the Object ID. This which is the unique ID of the service principal object associated with this application.

...

Code Block
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
  name: cloudaware-reader
rules:
- apiGroups: ["*"]
  resources: ["*"]
  verbs: ["get", "watch", "list"]
---
kind: ClusterRoleBinding
metadata:
  name: sp<sp-role-bindingbinding>
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: cluster<cluster-adminadmin>
subjects:
  - apiGroup: rbac.authorization.k8s.io
    kind: User
    name: <service-principal-object-id>

WHERE

in ClusterRoleBinding:

name: sp<sp-role-bindingbinding> in metadata should is a placeholder that needs to be replaced by your binding Cluster Role Binding namename:

cluster<cluster-adminadmin> in roleRef should is a placeholder that needs to be replaced by your cluster role nameCluster Role name

<service-principal-object-id> insubjects is a placeholder that needs to be replaced by your Azure Application Object ID

3. Run the following command:

...