Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat (infra): [cluster-stamp] migrate arm json to bicep and upgrade k8s version #65

Merged
merged 115 commits into from
Oct 21, 2022
Merged
Show file tree
Hide file tree
Changes from 114 commits
Commits
Show all changes
115 commits
Select commit Hold shift + click to select a range
a07cb1d
add params
ferantivero Oct 4, 2022
c78f5e0
add cluster control plane user assigned identity
ferantivero Oct 4, 2022
0e73b01
add cluster ingress controller user assigned identity
ferantivero Oct 4, 2022
3f60cf9
grant cluster control plane with Azure RBAC operator role permissions
ferantivero Oct 4, 2022
e18c446
add regional load balancer user assigned indentity
ferantivero Oct 10, 2022
ba64949
add the cluster kv instance
ferantivero Oct 10, 2022
f21a858
add get secrets and certs access policy for the in-cluster ingress co…
ferantivero Oct 10, 2022
191d983
add get secrets and certs access policy for the regional load balance…
ferantivero Oct 10, 2022
7adbd8f
add kv secret for app gw ssl cert
ferantivero Oct 10, 2022
13b1b57
add kv secret for aks regulated internal ingress controller ssl cert
ferantivero Oct 10, 2022
fe3a63b
add existing spoke vnet and app gw snet resources
ferantivero Oct 10, 2022
442ba0e
add log analytics workspace resource
ferantivero Oct 10, 2022
1bde208
add diagnostic settings cfg for kv instance
ferantivero Oct 10, 2022
c8a5fdc
add the cluster app gw instance
ferantivero Oct 10, 2022
ffa9030
add diagnostic settings cfg for app gw instance
ferantivero Oct 10, 2022
cac2df2
add spoke subnet containing private ips for private endpoints enablin…
ferantivero Oct 10, 2022
cf4fdd9
add private endpoint for kv enabling aks regulated cluster to connect…
ferantivero Oct 10, 2022
63d206c
add private dns zone for kv private Link support
ferantivero Oct 10, 2022
fb52a17
group the kv private endpoint into the private dns zone for private l…
ferantivero Oct 10, 2022
396c86f
add code region for subscription existing resources
ferantivero Oct 10, 2022
cb5bb74
role assign app gw mi with reader role over kv
ferantivero Oct 10, 2022
d28f632
role assign app gw mi with user secret role over kv
ferantivero Oct 10, 2022
02b5490
ensure private endpoint is created so the app gw access kv privately
ferantivero Oct 10, 2022
49d5c30
replace hardcoded zones by pickZones safer function
ferantivero Oct 10, 2022
5f0966c
add keyvault name output
ferantivero Oct 11, 2022
45ce200
add log analytics worspaces saved search for prometheus info
ferantivero Oct 11, 2022
4c47cb1
add log analytics worspaces saved search for total number of 403 resp…
ferantivero Oct 11, 2022
0b51887
add log analytics worspaces saved search for requested node reboot me…
ferantivero Oct 11, 2022
9aba6ff
add operation management solution for container insights
ferantivero Oct 11, 2022
c63027e
add operation management solution for vm insights
ferantivero Oct 11, 2022
cc5db88
add operation management solution for sec insights
ferantivero Oct 11, 2022
b920f9e
add workbook for sec insights
ferantivero Oct 11, 2022
904feaa
add operation management solution for key vault analytics
ferantivero Oct 11, 2022
aa56d6d
add activity log alerts for the spoke rg
ferantivero Oct 11, 2022
3ec82d5
add existing spoke subnet for ops management
ferantivero Oct 11, 2022
3f7ac3c
add vmss for jumpboxes
ferantivero Oct 11, 2022
e8f703a
add oms agent vmss extension for linux machines
ferantivero Oct 11, 2022
fdfdcca
add dependency agent vmss extension for linux machines
ferantivero Oct 11, 2022
d37ac05
add the pvt container registry for the regulated cluster
ferantivero Oct 11, 2022
884dd72
add cr geo redundancy
ferantivero Oct 11, 2022
db36e28
add private endpoint for cr enabling aks regulated cluster to connect…
ferantivero Oct 11, 2022
48a4d56
bug fix: change kv pdz to existing
ferantivero Oct 12, 2022
8b829ba
bug fix: use proper naming convention for kv pdzg
ferantivero Oct 12, 2022
c2e8fd5
add existing pdz for cr
ferantivero Oct 12, 2022
9b8ec38
group the cr private endpoint into the private dns zone for private l…
ferantivero Oct 12, 2022
191f7ad
add scheduled query for images being imported from cr repositories di…
ferantivero Oct 12, 2022
58f806a
add existing spoke management cr agent pools subnet
ferantivero Oct 12, 2022
1db23e6
add cr agent pool
ferantivero Oct 12, 2022
1399933
add diagnostic settings for cr
ferantivero Oct 12, 2022
60c9d50
ensure ContainerRegistryRepositoryEvents is enabled
ferantivero Oct 12, 2022
cb52215
add policy assignments
ferantivero Oct 12, 2022
c8a17be
ensure cluster control plane user assigned identity has all rbacs
ferantivero Oct 12, 2022
9d52a21
add existing spoke cluster system node pools subnet
ferantivero Oct 12, 2022
c88b308
add existing virtual network's subnet for cluster in-scope node pools
ferantivero Oct 12, 2022
76c0ea7
add k8s version
ferantivero Oct 13, 2022
ecb39b8
add existing virtual network's subnet for cluster out-scope node pools
ferantivero Oct 13, 2022
b9f278a
add existing private dns zone for aks regulated cluster
ferantivero Oct 13, 2022
1b7b3e3
add aks regulated cluster
ferantivero Oct 13, 2022
7c015cd
add existing role definition for cr pull permission
ferantivero Oct 13, 2022
6e0bc57
rbac kubelet cluster manage indentity to be able to pull cr images
ferantivero Oct 13, 2022
9d1e7bb
add scheduled query rule for getting the avg of pod failures
ferantivero Oct 13, 2022
d8e1a99
add rbac existing role definition for monitoring metric publisher rol…
ferantivero Oct 13, 2022
e661ec7
rbac cluster oms agent manage indentity to be able to push metrics to…
ferantivero Oct 13, 2022
7fa26ad
add diagnostic settings for regulated cluster
ferantivero Oct 13, 2022
7664f29
add metric alert for high cpu usage in CI-1
ferantivero Oct 13, 2022
dd0ca4f
add metric alert for high cpu usage in CI-2
ferantivero Oct 13, 2022
a28b926
add metric alert for jobs completed more than 6h ago in CI-11
ferantivero Oct 13, 2022
4f01473
add metric alert for container high cpu usage in CI-9
ferantivero Oct 13, 2022
a987d22
add metric alert for container high container working set memory usag…
ferantivero Oct 13, 2022
a2cbb3e
add metric alert for pods in failed state in CI-4
ferantivero Oct 13, 2022
32711cc
add metric alert for high disk usage in CI-5
ferantivero Oct 13, 2022
a3814e0
add metric alert for nodes not in ready status in CI-3
ferantivero Oct 13, 2022
de66abc
add metric alert for omm killed pods in CI-6
ferantivero Oct 13, 2022
bb57d23
add metric alert for persisten vol high usage CI-18
ferantivero Oct 13, 2022
c76c001
add metric alert for pods not in ready status in CI-8
ferantivero Oct 13, 2022
e7f2ec5
add metric alert for restarting continers count in CI-7
ferantivero Oct 13, 2022
e8794cd
bug fix: threshold value type
ferantivero Oct 13, 2022
4e56ec7
delete the json cluster stamp v0
ferantivero Oct 13, 2022
87a222b
use bicep in readme file
ferantivero Oct 13, 2022
660a282
big fix: replace hardcoded zones for pickup zone function
ferantivero Oct 13, 2022
4beb2ef
Apply PR Feedback: new code comments, typos, proper capitalization an…
ferantivero Oct 14, 2022
e34258a
Apply PR Feeback: restore location default value
ferantivero Oct 14, 2022
e368763
Apply PR Feeback: restore geo redundancy location default value
ferantivero Oct 14, 2022
a45abb2
Apply PR Feeback: bug fix - remove wrong assigned default value
ferantivero Oct 14, 2022
58838dc
Apply PR Feedback: consider just calling this spokeResourceGroup that…
ferantivero Oct 14, 2022
e64c830
Proposal based on PR feedback: consider just calling this vnetSpoke t…
ferantivero Oct 14, 2022
1619535
Apply PR Feedback: bug fix - add missing rg scope
ferantivero Oct 14, 2022
b3f417e
fix indentation
ferantivero Oct 14, 2022
c0f0d0e
Apply PR Feedback: bug fix - add partially missing code comments
ferantivero Oct 14, 2022
cc33692
Apply PR Feedback: add existing a remove resourceId function call
ferantivero Oct 14, 2022
d03bb31
Apply PR Feedback: restore missing commented out code
ferantivero Oct 14, 2022
1ee80e1
Apply PR Feeback: restore la- convention for log analytics resource type
ferantivero Oct 14, 2022
7f8872d
Apply PR Feedback: restore secret name to its preview value keeping t…
ferantivero Oct 14, 2022
300ae00
Apply PR Feeback: keep it acr instead of cr
ferantivero Oct 14, 2022
780d373
Apply PR Feedback: use resourceGroup func
ferantivero Oct 14, 2022
cdf8658
propagate resource name to instance object name to keep it consistent
ferantivero Oct 14, 2022
c8782f5
Apply PR Feedback: change to resourceGroup func in all ocurrences
ferantivero Oct 14, 2022
4333e6c
bug fix description
ferantivero Oct 14, 2022
54df66b
Apply PR Feedback: go full rbac for accessing cert and secrets in thi…
ferantivero Oct 14, 2022
75fb99b
upgrade cluster version
ferantivero Oct 18, 2022
7501924
bug fix: defender - use valid fields
ferantivero Oct 18, 2022
d0974f0
bug fix: kv rbac migration
ferantivero Oct 18, 2022
9bd31f5
bug fix: update role assignments to the latest api version
ferantivero Oct 18, 2022
dcb3a78
bug fix: add new priority required field in app gw routing rules
ferantivero Oct 18, 2022
ca9a7f4
change reference to use object instance instead
ferantivero Oct 18, 2022
ca1e184
bug fix: remove readonly scope policy assigment field
ferantivero Oct 18, 2022
8fe2a49
bug fix: add managed cluster scope to diagnostic settings
ferantivero Oct 18, 2022
c8bc649
bug fix: role assign the proper resource
ferantivero Oct 18, 2022
6b6c06d
bug fix: target the proper ipgroup when applying fw app rules
ferantivero Oct 19, 2022
6f45320
bug fix: add missing commented out code
ferantivero Oct 19, 2022
6fb607f
bug fix: virtual network link for dns resolution must target hub vnet…
ferantivero Oct 20, 2022
b275ce5
migrate stamp v2 to bicep lang
ferantivero Oct 20, 2022
39c735f
Address PR Feedback: bug fix - managedClusters doesn't support availa…
ferantivero Oct 20, 2022
ae8ae34
Apply PR Feedback: as part of this migration enable the acr zone redu…
ferantivero Oct 21, 2022
4af8db0
bug fix: fix commented out nodeTaints
ferantivero Oct 21, 2022
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2,239 changes: 2,239 additions & 0 deletions cluster-stamp.bicep

Large diffs are not rendered by default.

2,447 changes: 0 additions & 2,447 deletions cluster-stamp.json

This file was deleted.

2,249 changes: 2,249 additions & 0 deletions cluster-stamp.v2.bicep

Large diffs are not rendered by default.

2,458 changes: 0 additions & 2,458 deletions cluster-stamp.v2.json

This file was deleted.

10 changes: 5 additions & 5 deletions docs/deploy/09-aks-cluster.md
Original file line number Diff line number Diff line change
Expand Up @@ -45,21 +45,21 @@ Now that the [hub-spoke network is provisioned](./08-cluster-networking.md), the

```bash
# [This takes about 20 minutes to run.]
az deployment group create -g rg-bu0001a0005 -f cluster-stamp.json -p targetVnetResourceId=${RESOURCEID_VNET_CLUSTERSPOKE} clusterAdminAadGroupObjectId=${AADOBJECTID_GROUP_CLUSTERADMIN} k8sControlPlaneAuthorizationTenantId=${TENANTID_K8SRBAC} appGatewayListenerCertificate=${APP_GATEWAY_LISTENER_CERTIFICATE_BASE64} aksIngressControllerCertificate=${INGRESS_CONTROLLER_CERTIFICATE_BASE64} jumpBoxImageResourceId=${RESOURCEID_IMAGE_JUMPBOX} jumpBoxCloudInitAsBase64=${CLOUDINIT_BASE64}
az deployment group create -g rg-bu0001a0005 -f cluster-stamp.bicep -p targetVnetResourceId=${RESOURCEID_VNET_CLUSTERSPOKE} clusterAdminAadGroupObjectId=${AADOBJECTID_GROUP_CLUSTERADMIN} k8sControlPlaneAuthorizationTenantId=${TENANTID_K8SRBAC} appGatewayListenerCertificate=${APP_GATEWAY_LISTENER_CERTIFICATE_BASE64} aksIngressControllerCertificate=${INGRESS_CONTROLLER_CERTIFICATE_BASE64} jumpBoxImageResourceId=${RESOURCEID_IMAGE_JUMPBOX} jumpBoxCloudInitAsBase64=${CLOUDINIT_BASE64}

# Or if you updated and wish to use the parameters file …
#az deployment group create -g rg-bu0001a0005 -f cluster-stamp.json -p "@azuredeploy.parameters.prod.json"
#az deployment group create -g rg-bu0001a0005 -f cluster-stamp.bicep -p "@azuredeploy.parameters.prod.json"
```

1. Update cluster deployment with managed identity assignments.

**cluster-stamp.v2.json** is a _tiny_ evolution of the **cluster-stamp.json** ARM template you literally just deployed in the step above. Because we are using Azure AD Pod Identity v1 as a Microsoft-managed add-on, the mechanism to associate identities with the cluster is via ARM template instead of via Kubernetes manifest deployments (as you would do with the vanilla open source solution). However, due to a current limitation of the add-on, managed identities for Pod Managed Identities CANNOT be associated to the cluster when the cluster is first being created, only as an update to an existing cluster. So this deployment will re-deploy with the Pod Managed Identity association as the _only change_. Pod Managed Identity v2 is in development and it will support assignment at cluster-creation time. This implementation will evolve to use Azure AD Pod Identity v2 when available and we'll remove this step and add the assignment directly in `cluster-stamp.json`.
**cluster-stamp.v2.json** is a _tiny_ evolution of the **cluster-stamp.bicep** ARM template you literally just deployed in the step above. Because we are using Azure AD Pod Identity v1 as a Microsoft-managed add-on, the mechanism to associate identities with the cluster is via ARM template instead of via Kubernetes manifest deployments (as you would do with the vanilla open source solution). However, due to a current limitation of the add-on, managed identities for Pod Managed Identities CANNOT be associated to the cluster when the cluster is first being created, only as an update to an existing cluster. So this deployment will re-deploy with the Pod Managed Identity association as the _only change_. Pod Managed Identity v2 is in development and it will support assignment at cluster-creation time. This implementation will evolve to use Azure AD Pod Identity v2 when available and we'll remove this step and add the assignment directly in `cluster-stamp.bicep`.

> :eyes: If you're curious to see what changed in the cluster stamp, [view the diff](https://diffviewer.azureedge.net/?l=https://raw.githubusercontent.com/mspnp/aks-baseline-regulated/main/cluster-stamp.json&r=https://raw.githubusercontent.com/mspnp/aks-baseline-regulated/main/cluster-stamp.v2.json).
> :eyes: If you're curious to see what changed in the cluster stamp, [view the diff](https://diffviewer.azureedge.net/?l=https://raw.githubusercontent.com/mspnp/aks-baseline-regulated/main/cluster-stamp.bicep&r=https://raw.githubusercontent.com/mspnp/aks-baseline-regulated/main/cluster-stamp.v2.bicep).

```bash
# [This takes about five minutes to run.]
az deployment group create -g rg-bu0001a0005 -f cluster-stamp.v2.json -p targetVnetResourceId=${RESOURCEID_VNET_CLUSTERSPOKE} clusterAdminAadGroupObjectId=${AADOBJECTID_GROUP_CLUSTERADMIN} k8sControlPlaneAuthorizationTenantId=${TENANTID_K8SRBAC} appGatewayListenerCertificate=${APP_GATEWAY_LISTENER_CERTIFICATE_BASE64} aksIngressControllerCertificate=${AKS_INGRESS_CONTROLLER_CERTIFICATE_BASE64} jumpBoxImageResourceId=${RESOURCEID_IMAGE_JUMPBOX} jumpBoxCloudInitAsBase64=${CLOUDINIT_BASE64}
az deployment group create -g rg-bu0001a0005 -f cluster-stamp.v2.bicep -p targetVnetResourceId=${RESOURCEID_VNET_CLUSTERSPOKE} clusterAdminAadGroupObjectId=${AADOBJECTID_GROUP_CLUSTERADMIN} k8sControlPlaneAuthorizationTenantId=${TENANTID_K8SRBAC} appGatewayListenerCertificate=${APP_GATEWAY_LISTENER_CERTIFICATE_BASE64} aksIngressControllerCertificate=${AKS_INGRESS_CONTROLLER_CERTIFICATE_BASE64} jumpBoxImageResourceId=${RESOURCEID_IMAGE_JUMPBOX} jumpBoxCloudInitAsBase64=${CLOUDINIT_BASE64}

# Or if you used the parameters file …
#az deployment group create -g rg-bu0001a0005 -f cluster-stamp.v2.json -p "@azuredeploy.parameters.prod.json"
Expand Down
144 changes: 144 additions & 0 deletions modules/ensureClusterIdentityHasRbacToSelfManagedResources.bicep
Original file line number Diff line number Diff line change
@@ -0,0 +1,144 @@
targetScope = 'resourceGroup'

/*** PARAMETERS ***/

@description('The AKS Control Plane Principal Id to be given with Network Contributor Role in different spoke subnets, so it can join VMSS and load balancers resources to them.')
@minLength(36)
@maxLength(36)
param miClusterControlPlanePrincipalId string

@description('The AKS Control Plane Principal Name to be used to create unique role assignments names.')
@minLength(3)
@maxLength(128)
param clusterControlPlaneIdentityName string

@description('The regional network spoke VNet Resource name that the cluster is being joined to, so it can be used to discover subnets during role assignments.')
@minLength(1)
param vnetSpokeName string

@allowed([
'australiaeast'
'canadacentral'
'centralus'
'eastus'
'eastus2'
'westus2'
'francecentral'
'germanywestcentral'
'northeurope'
'southafricanorth'
'southcentralus'
'uksouth'
'westeurope'
'japaneast'
'southeastasia'
])
@description('AKS Service, Node Pools, and supporting services (KeyVault, App Gateway, etc) region. This needs to be the same region as the vnet provided in these parameters.')
@minLength(4)
param location string

/*** EXISTING SUBSCRIPTION RESOURCES ***/

resource networkContributorRole 'Microsoft.Authorization/roleDefinitions@2022-04-01' existing = {
name: '4d97b98b-1d4f-4787-a291-c67834d212e7'
scope: subscription()
}

resource dnsZoneContributorRole 'Microsoft.Authorization/roleDefinitions@2022-04-01' existing = {
name: 'b12aa53e-6015-4669-85d0-8515ebb3ae7f'
scope: subscription()
}

/*** EXISTING SPOKE RESOURCES ***/

resource pdzMc 'Microsoft.Network/privateDnsZones@2020-06-01' existing = {
name: 'privatelink.${location}.azmk8s.io'
}

resource vnetSpoke 'Microsoft.Network/virtualNetworks@2022-01-01' existing = {
name: vnetSpokeName

resource snetClusterSystemNodePools 'subnets' existing = {
name: 'snet-cluster-systemnodepool'
}

resource snetClusterInScopeNodePools 'subnets' existing = {
name: 'snet-cluster-inscopenodepools'
}

resource snetClusterOutofScopeNodePools 'subnets' existing = {
name: 'snet-cluster-outofscopenodepools'
}

resource snetClusterIngressServices 'subnets' existing = {
name: 'snet-cluster-ingressservices'
}
}

/*** RESOURCES ***/

resource vnetMiClusterControlPlaneDnsZoneContributorRole_roleAssignment 'Microsoft.Authorization/roleAssignments@2020-04-01-preview' = {
scope: vnetSpoke
name: guid(vnetSpoke.id, dnsZoneContributorRole.id, clusterControlPlaneIdentityName)
properties: {
roleDefinitionId: dnsZoneContributorRole.id
description: 'Allows cluster identity to attach custom DNS zone with Private Link information to this virtual network.'
principalId: miClusterControlPlanePrincipalId
principalType: 'ServicePrincipal'
}
}

resource snetSystemNodePoolSubnetMiClusterControlPlaneNetworkContributorRole_roleAssignment 'Microsoft.Authorization/roleAssignments@2020-04-01-preview' = {
scope: vnetSpoke::snetClusterSystemNodePools
name: guid(vnetSpoke::snetClusterSystemNodePools.id, networkContributorRole.id, clusterControlPlaneIdentityName)
properties: {
roleDefinitionId: networkContributorRole.id
description: 'Allows cluster identity to join the nodepool vmss resources to this subnet.'
principalId: miClusterControlPlanePrincipalId
principalType: 'ServicePrincipal'
}
}

resource snetInScopeNodePoolSubnetsnetSystemNodePoolSubnetMiClusterControlPlaneNetworkContributorRole_roleAssignment 'Microsoft.Authorization/roleAssignments@2020-04-01-preview' = {
scope: vnetSpoke::snetClusterInScopeNodePools
name: guid(vnetSpoke::snetClusterInScopeNodePools.id, networkContributorRole.id, clusterControlPlaneIdentityName)
properties: {
roleDefinitionId: networkContributorRole.id
description: 'Allows cluster identity to join the nodepool vmss resources to this subnet.'
principalId: miClusterControlPlanePrincipalId
principalType: 'ServicePrincipal'
}
}

resource snetOutOfScopeNodePoolSubnetMiClusterControlPlaneNetworkContributorRole_roleAssignment 'Microsoft.Authorization/roleAssignments@2020-04-01-preview' = {
scope: vnetSpoke::snetClusterOutofScopeNodePools
name: guid(vnetSpoke::snetClusterOutofScopeNodePools.id, networkContributorRole.id, clusterControlPlaneIdentityName)
properties: {
roleDefinitionId: networkContributorRole.id
description: 'Allows cluster identity to join the nodepool vmss resources to this subnet.'
principalId: miClusterControlPlanePrincipalId
principalType: 'ServicePrincipal'
}
}

resource snetIngressServicesSubnetMiClusterControlPlaneNetworkContributorRole_roleAssignment 'Microsoft.Authorization/roleAssignments@2020-04-01-preview' = {
scope: vnetSpoke::snetClusterIngressServices
name: guid(vnetSpoke::snetClusterIngressServices.id, networkContributorRole.id, clusterControlPlaneIdentityName)
properties: {
roleDefinitionId: networkContributorRole.id
description: 'Allows cluster identity to join load balancers (ingress resources) to this subnet.'
principalId: miClusterControlPlanePrincipalId
principalType: 'ServicePrincipal'
}
}

resource pdzMcPrivatelinkAzmk8sIoMiClusterControlPlaneDnsZoneContributorRole_roleAssignment 'Microsoft.Authorization/roleAssignments@2020-04-01-preview' = {
scope: pdzMc
name: guid(pdzMc.id, dnsZoneContributorRole.id, clusterControlPlaneIdentityName)
properties: {
roleDefinitionId: dnsZoneContributorRole.id
description: 'Allows cluster identity to manage zone Entries for cluster\'s Private Link configuration.'
principalId: miClusterControlPlanePrincipalId
principalType: 'ServicePrincipal'
}
}
10 changes: 5 additions & 5 deletions networking/hub-region.v2.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -892,7 +892,7 @@ resource hubFirewall 'Microsoft.Network/azureFirewalls@2021-05-01' = {
name: 'az-login'
description: 'Allow jumpboxes to perform az login.'
sourceIpGroups: [
aks_ipgroup.id
aksJumpbox_ipgroup.id
]
protocols: [
{
Expand All @@ -909,7 +909,7 @@ resource hubFirewall 'Microsoft.Network/azureFirewalls@2021-05-01' = {
name: 'az-management-api'
description: 'Allow jumpboxes to communicate with Azure management APIs.'
sourceIpGroups: [
aks_ipgroup.id
aksJumpbox_ipgroup.id
]
protocols: [
{
Expand All @@ -926,7 +926,7 @@ resource hubFirewall 'Microsoft.Network/azureFirewalls@2021-05-01' = {
name: 'az-cli-extensions'
description: 'Allow jumpboxes query az cli status and download extensions'
sourceIpGroups: [
aks_ipgroup.id
aksJumpbox_ipgroup.id
]
protocols: [
{
Expand All @@ -946,7 +946,7 @@ resource hubFirewall 'Microsoft.Network/azureFirewalls@2021-05-01' = {
name: 'github'
description: 'Allow pulling things down from GitHub. [Only a requirement of this walkthrough because we deploy some manifests that you clone from your repo.]'
sourceIpGroups: [
aks_ipgroup.id
aksJumpbox_ipgroup.id
]
protocols: [
{
Expand All @@ -964,7 +964,7 @@ resource hubFirewall 'Microsoft.Network/azureFirewalls@2021-05-01' = {
name: 'azure-monitor-addon'
description: 'Required for Azure Monitor Extension on Jumpbox.'
sourceIpGroups: [
aks_ipgroup.id
aksJumpbox_ipgroup.id
]
protocols: [
{
Expand Down
2 changes: 1 addition & 1 deletion networking/spoke-BU0001A0005-01.bicep
Original file line number Diff line number Diff line change
Expand Up @@ -862,7 +862,7 @@ resource aksPrivateDnsZones_virtualNetworkLink_toClusterVNet 'Microsoft.Network/
location: 'global'
properties: {
virtualNetwork: {
id: clusterVNet.id
id: hubVnetResourceId
}
registrationEnabled: false
}
Expand Down