To execute Azure Chaos Studio experiments on target resources without requiring the Microsoft.Authorization/roleAssignments/write permission, you need to ensure that your setup adheres to the permissions model of Azure Chaos Studio. Here are some suggestions based on the context provided:
- Use Managed Identities: Since you have already tried using both system-assigned and user-assigned managed identities, ensure that the managed identity has the necessary permissions on the target resources. The managed identity should have permissions like
Microsoft.Web/sites/start/actionandMicrosoft.Web/sites/stop/actionto perform the desired actions. - Role Assignment: If your account does not have the privilege to assign roles, you may need to work with an Azure administrator who can grant the necessary role assignments to the managed identity. This is crucial as the chaos experiments require specific permissions to execute.
- Custom Roles: If you are creating custom roles, ensure that they include all necessary actions related to Chaos Studio and the specific actions for your target resources. The custom role should encompass the permissions required for chaos experiments, including the permissions to read and modify the target resources.
- Experiment Permissions: Ensure that you have assigned the correct permissions to the chaos experiment itself. You can use Azure built-in roles such as Chaos Studio Experiment Contributor or Chaos Studio Operator to manage access effectively. These roles can help you create, run, and manage experiments without needing additional role assignment permissions.
- Check Resource Onboarding: Make sure that the target resource (your Springboot app) is properly onboarded to Chaos Studio with the required capabilities enabled. If the resource is not onboarded correctly, the experiment may fail to execute.
- Documentation Review: Review the Azure documentation on permissions and security in Chaos Studio to ensure that all necessary steps have been followed. This includes verifying that the chaos experiment has the correct permissions assigned and that the target resources are set up correctly.
If you continue to face issues, it may be beneficial to reach out to Azure support for further assistance, as they can provide insights specific to your Azure environment and permissions setup.
References: