-
Notifications
You must be signed in to change notification settings - Fork 477
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Azure CNI requires cluster identity to have Network Contributor permissions #178
Comments
It seems like the |
Make it optional, |
@mosheavni can you confirm with which parameters you are calling the module ? May I ask if you have the AKS cluster and the network in the same resource group ? I am interested specifically in your exact combination of these 4 parameters:
That are used in these sections of the module: Lines 116 to 123 in ce49be5
Lines 198 to 205 in ce49be5
I am not using the Could you please share more about your setup ? thanks |
I have been hit by this issue again today. I want to share some notes to troubleshoot this. I am using
I check the role assignment to that identity:
And I get by default the Interestingly enough this role assignment is enough to create an external Load Balancer but it is not enough to create an Internal Load Balancer. |
According to the documentation:
https://docs.microsoft.com/en-us/azure/aks/configure-azure-cni#prerequisites
The
terraform-azurerm-aks
module by default does not take care of this, and when I tried to create aService
oftype: LoadBalancer
I had this issue:This is a very well known issue and I fixed it adding to my Terraform code that calls the module the following resource:
However does it make sense to create this
azurerm_role_assignment
directly in theterraform-azurerm-aks
module ?The text was updated successfully, but these errors were encountered: