How to grant permission for list nodes in AKS using Azure RBAC
Using Azure RBAC for Kubernetes Authorization, we have been able to grant users read access to most of our Kubernetes resources e.g. pods, deployments, configmaps, etc.
However, read access to nodes is still unauthorized. According to https://learn.microsoft.com/en-us/azure/role-based-access-control/built-in-roles/containers#azure-kubernetes-service-rbac-reader, someone with the Azure Kubernetes Service RBAC reader role should also be able to list nodes, but kubectl get nodes
doesn't work due to unauthorized access. Why is that? and how can I grant a user read-only access to nodes?
Screenshot below shows that the cluster has enabled Azure RBAC.