You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We will now create an Azure authentication app and get the necesssary credentials so Robusta can access Prometheus data.
60
83
61
84
1. Follow this Azure guide to `Register an app with Azure Active Directory <https://learn.microsoft.com/en-us/azure/azure-monitor/essentials/prometheus-self-managed-grafana-azure-active-directory#register-an-app-with-azure-active-directory>`_
62
-
63
85
2. In your generated_values.yaml file add the following environment variables from the previous step.
64
86
65
87
.. code-block:: yaml
@@ -105,10 +127,64 @@ We will now use the Kubelet's Managed Identity so Robusta can access Prometheus
105
127
106
128
3. Give access to your Managed Identity on your workspace:
107
129
108
-
a. Open the Access Control (IAM) page for your Azure Monitor workspace in the Azure portal.
109
-
b. Select Add role assignment.
110
-
c. Select Monitoring Data Reader and select Next.
111
-
d. For Assign access to, select Managed identity.
112
-
e. Select + Select members.
113
-
f. Select the Managed Identity you got from step 1
114
-
g. Select Review + assign to save the configuration.
130
+
#. Open the Access Control (IAM) page for your Azure Monitor workspace in the Azure portal.
131
+
#. Select Add role assignment.
132
+
#. Select Monitoring Data Reader and select Next.
133
+
#. For Assign access to, select Managed identity.
134
+
#. Select + Select members.
135
+
#. Select the Managed Identity you got from step 1
136
+
#. Select Review + assign to save the configuration.
137
+
138
+
Option #3: Use Azure Workload Identity
139
+
==============================================
140
+
141
+
We will create a new Managed Identity and bound it to Robusta's Service Account so Robusta can access Prometheus data.
142
+
143
+
1. Requirements
144
+
145
+
AKS cluster needs to have Workload Identity add-on and OIDC issuer enabled. You can use `--enable-oidc-issuer --enable-workload-identity` with `az aks create` or `az aks update` to enable them.
146
+
147
+
2. Create a new Managed Identity. Change the Identity name, resource group and location to match your environment.
148
+
149
+
.. code-block:: bash
150
+
151
+
export SUBSCRIPTION="$(az account show --query id --output tsv)"
az identity show --name "robusta-id" --resource-group "robusta-dev" -query clientId -o tsv # keep this value for the step #3
154
+
155
+
3. In your generated_values.yaml file add the following environment variables from the previous step.
156
+
157
+
.. code-block:: yaml
158
+
159
+
runner:
160
+
additional_env_vars:
161
+
- name: PROMETHEUS_SSL_ENABLED
162
+
value: "true"
163
+
- name: AZURE_USE_WORKLOAD_ID
164
+
value: "true"
165
+
- name: AZURE_CLIENT_ID
166
+
value: "<your-client-id>"
167
+
- name: AZURE_TENANT_ID
168
+
value: "<your-tenant-id>"
169
+
azure:
170
+
workloadIdentity:
171
+
enabled: true
172
+
173
+
4. Federate the Service Account with the Managed Identity. Replace the values with the ones from the step #1.
174
+
175
+
.. code-block:: bash
176
+
177
+
export AKS_OIDC_ISSUER="$(az aks show -g <resource-group> -n <cluster-name> --query "oidcIssuerProfile.issuerUrl" -otsv)"# Replace with the corresponding values of your AKS clusters.
0 commit comments