...
1. Locate the service principal ID of the Azure App added to Cloudaware. Log in to Azure Portal → Azure Active Directory → Enterprise applications → select the app. Copy and save the Object ID. This which is the unique ID of the service principal object associated with this application.
...
Code Block |
---|
apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: cloudaware-reader rules: - apiGroups: ["*"] resources: ["*"] verbs: ["get", "watch", "list"] --- kind: ClusterRoleBinding metadata: name: sp<sp-role-bindingbinding> roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cluster<cluster-adminadmin> subjects: - apiGroup: rbac.authorization.k8s.io kind: User name: <service-principal-object-id> |
WHERE
in ClusterRoleBinding:
name: sp<sp-role-bindingbinding> in metadata
should is a placeholder that needs to be replaced by your binding Cluster Role Binding namename:
cluster<cluster-adminadmin> in roleRef
should is a placeholder that needs to be replaced by your cluster role nameCluster Role name
<service-principal-object-id> insubjects
is a placeholder that needs to be replaced by your Azure Application Object ID
3. Run the following command:
...