-
Notifications
You must be signed in to change notification settings - Fork 431
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Multi-tenancy within one manager instance using Azure User Assigned Identities #1104
Comments
/assign |
As @nader-ziada was mentioning and if I recall correctly, AAD Pod Identity is configured to work within a resource group when assigning managed identities and is configured through https://github.com/Azure/aad-pod-identity/blob/fb1bdba48ab5c1fa0be64382b6a74acdbcb41089/pkg/config/azureconfig.go#L10. After talking with @aramase, the reasoning behind this was mostly due to performance concerns of having to look up Azure resources outside of the resource group, which can be an expensive operation. I did not get the feeling scoping by resource group was functionally necessary if a resource lookup could be done in an efficient manner. Since CAPZ resources can be in any resource group a user desires and AAD Pod Identity is intended to be run as a singleton controller within a cluster, the constraint on resource group scoping of the Managed Identity Controller must be removed to unblock Managed Identities for CAPZ. Happy to setup some time to discuss in adhoc meeting, in thread, or during our next office hours. |
The @devigned The management cluster is the one that has the identities, right? |
Yes. So, are you saying that Azure compute resources hosting the management cluster would not span multiple resource groups, so having resourcegroup in the azure.json makes sense? |
Yeah, that's right. Users can bring their own managed identities which belong to any resource group within the tenant. After they assign the required role assignments pod identity will be able to assign the identities to the underlying VMSS/VM. |
@nader-ziada or @shysank wdyt? |
I think one concern was that we are currently using the managed mode with only |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-contributor-experience at kubernetes/community. |
/remove-lifecycle stale |
/assign |
Experiencing this exact issue trying to create a cluster using this provider...
We are seeking assistance! |
/assign |
/kind feature
Describe the solution you'd like
As described by the multi-tenancy design proposal https://github.com/kubernetes-sigs/cluster-api-provider-azure/blob/master/docs/proposals/20200720-single-controller-multitenancy.md (updated in #1089),
the manager instance should also support
Azure User Assigned Identities
The current implementation (from pr #977) only added support for using Service Principal using
aad-pod-identity
The text was updated successfully, but these errors were encountered: