컨테이너에 대한 Azure 기본 제공 역할
이 문서에서는 컨테이너 범주의 Azure 기본 제공 역할을 나열합니다.
AcrDelete
컨테이너 레지스트리에서 리포지토리, 태그 또는 매니페스트를 삭제합니다.
작업 | 설명 |
---|---|
Microsoft.ContainerRegistry/registries/artifacts/delete | 컨테이너 레지스트리에서 아티팩트를 삭제합니다. |
NotActions | |
없음 | |
DataActions | |
없음 | |
NotDataActions | |
없음 |
{
"assignableScopes": [
"/"
],
"description": "acr delete",
"id": "/providers/Microsoft.Authorization/roleDefinitions/c2f4ef07-c644-48eb-af81-4b1b4947fb11",
"name": "c2f4ef07-c644-48eb-af81-4b1b4947fb11",
"permissions": [
{
"actions": [
"Microsoft.ContainerRegistry/registries/artifacts/delete"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"roleName": "AcrDelete",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
AcrImageSigner
콘텐츠 신뢰가 사용하도록 설정된 컨테이너 레지스트리에 신뢰할 수 있는 이미지를 푸시하거나 가져옵니다.
작업 | 설명 |
---|---|
Microsoft.ContainerRegistry/registries/sign/write | 컨테이너 레지스트리에 대한 콘텐츠 신뢰 메타데이터를 푸시/풀합니다. |
NotActions | |
없음 | |
DataActions | |
Microsoft.ContainerRegistry/registries/trustedCollections/write | 컨테이너 레지스트리 콘텐츠의 신뢰할 수 있는 컬렉션을 푸시하거나 게시할 수 있습니다. 이는 데이터 작업이라는 점을 제외하고 Microsoft.ContainerRegistry/registries/sign/write 작업과 유사합니다. |
NotDataActions | |
없음 |
{
"assignableScopes": [
"/"
],
"description": "acr image signer",
"id": "/providers/Microsoft.Authorization/roleDefinitions/6cef56e8-d556-48e5-a04f-b8e64114680f",
"name": "6cef56e8-d556-48e5-a04f-b8e64114680f",
"permissions": [
{
"actions": [
"Microsoft.ContainerRegistry/registries/sign/write"
],
"notActions": [],
"dataActions": [
"Microsoft.ContainerRegistry/registries/trustedCollections/write"
],
"notDataActions": []
}
],
"roleName": "AcrImageSigner",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
AcrPull
컨테이너 레지스트리에서 아티팩트를 가져옵니다.
작업 | 설명 |
---|---|
Microsoft.ContainerRegistry/registries/pull/read | 컨테이너 레지스트리에서 이미지를 끌어오거나 가져옵니다. |
NotActions | |
없음 | |
DataActions | |
없음 | |
NotDataActions | |
없음 |
{
"assignableScopes": [
"/"
],
"description": "acr pull",
"id": "/providers/Microsoft.Authorization/roleDefinitions/7f951dda-4ed3-4680-a7ca-43fe172d538d",
"name": "7f951dda-4ed3-4680-a7ca-43fe172d538d",
"permissions": [
{
"actions": [
"Microsoft.ContainerRegistry/registries/pull/read"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"roleName": "AcrPull",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
AcrPush
컨테이너 레지스트리에 아티팩트를 푸시하거나 가져옵니다.
작업 | 설명 |
---|---|
Microsoft.ContainerRegistry/registries/pull/read | 컨테이너 레지스트리에서 이미지를 끌어오거나 가져옵니다. |
Microsoft.ContainerRegistry/registries/push/write | 컨테이너 레지스트리에 이미지를 푸시하거나 씁니다. |
NotActions | |
없음 | |
DataActions | |
없음 | |
NotDataActions | |
없음 |
{
"assignableScopes": [
"/"
],
"description": "acr push",
"id": "/providers/Microsoft.Authorization/roleDefinitions/8311e382-0749-4cb8-b61a-304f252e45ec",
"name": "8311e382-0749-4cb8-b61a-304f252e45ec",
"permissions": [
{
"actions": [
"Microsoft.ContainerRegistry/registries/pull/read",
"Microsoft.ContainerRegistry/registries/push/write"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"roleName": "AcrPush",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
AcrQuarantineReader
컨테이너 레지스트리에서 격리된 이미지를 끌어옵니다.
작업 | 설명 |
---|---|
Microsoft.ContainerRegistry/registries/quarantine/read | 컨테이너 레지스트리에서 격리된 이미지 끌어오기 또는 가져오기 |
NotActions | |
없음 | |
DataActions | |
Microsoft.ContainerRegistry/registries/quarantinedArtifacts/read | 컨테이너 레지스트리에서 격리된 아티팩트를 끌어오거나 가져올 수 있습니다. 이는 데이터 작업이라는 점을 제외하고 Microsoft.ContainerRegistry/registries/quarantine/read와 유사합니다. |
NotDataActions | |
없음 |
{
"assignableScopes": [
"/"
],
"description": "acr quarantine data reader",
"id": "/providers/Microsoft.Authorization/roleDefinitions/cdda3590-29a3-44f6-95f2-9f980659eb04",
"name": "cdda3590-29a3-44f6-95f2-9f980659eb04",
"permissions": [
{
"actions": [
"Microsoft.ContainerRegistry/registries/quarantine/read"
],
"notActions": [],
"dataActions": [
"Microsoft.ContainerRegistry/registries/quarantinedArtifacts/read"
],
"notDataActions": []
}
],
"roleName": "AcrQuarantineReader",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
AcrQuarantineWriter
격리된 이미지를 컨테이너 레지스트리로 푸시하거나 컨테이너 레지스트리에서 가져옵니다.
작업 | 설명 |
---|---|
Microsoft.ContainerRegistry/registries/quarantine/read | 컨테이너 레지스트리에서 격리된 이미지 끌어오기 또는 가져오기 |
Microsoft.ContainerRegistry/registries/quarantine/write | 격리된 이미지의 격리 상태 작성/수정 |
NotActions | |
없음 | |
DataActions | |
Microsoft.ContainerRegistry/registries/quarantinedArtifacts/read | 컨테이너 레지스트리에서 격리된 아티팩트를 끌어오거나 가져올 수 있습니다. 이는 데이터 작업이라는 점을 제외하고 Microsoft.ContainerRegistry/registries/quarantine/read와 유사합니다. |
Microsoft.ContainerRegistry/registries/quarantinedArtifacts/write | 격리된 아티팩트의 격리 상태를 작성하거나 업데이트할 수 있습니다. 이는 데이터 작업이라는 점을 제외하고 Microsoft.ContainerRegistry/registries/격리/쓰기 작업과 유사합니다. |
NotDataActions | |
없음 |
{
"assignableScopes": [
"/"
],
"description": "acr quarantine data writer",
"id": "/providers/Microsoft.Authorization/roleDefinitions/c8d4ff99-41c3-41a8-9f60-21dfdad59608",
"name": "c8d4ff99-41c3-41a8-9f60-21dfdad59608",
"permissions": [
{
"actions": [
"Microsoft.ContainerRegistry/registries/quarantine/read",
"Microsoft.ContainerRegistry/registries/quarantine/write"
],
"notActions": [],
"dataActions": [
"Microsoft.ContainerRegistry/registries/quarantinedArtifacts/read",
"Microsoft.ContainerRegistry/registries/quarantinedArtifacts/write"
],
"notDataActions": []
}
],
"roleName": "AcrQuarantineWriter",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Azure Arc 지원 Kubernetes 클러스터 사용자 역할
클러스터 사용자 자격 증명 작업을 나열합니다.
actions | 설명 |
---|---|
Microsoft.Resources/deployments/write | 배포를 만들거나 업데이트합니다. |
Microsoft.Resources/subscriptions/operationresults/read | 구독 작업 결과를 가져옵니다. |
Microsoft.Resources/subscriptions/read | 구독 목록을 가져옵니다. |
Microsoft.Resources/subscriptions/resourceGroups/read | 리소스 그룹을 가져오거나 나열합니다. |
Microsoft.Kubernetes/connectedClusters/listClusterUserCredentials/action | clusterUser 자격 증명(미리 보기)을 나열합니다. |
Microsoft.Authorization/*/read | 역할 및 역할 할당 읽기 |
Microsoft.Insights/alertRules/* | 클래식 메트릭 경고를 만들고 관리합니다. |
Microsoft.Support/* | 지원 티켓을 만들거나 업데이트합니다. |
Microsoft.Kubernetes/connectedClusters/listClusterUserCredential/action | clusterUser 자격 증명 나열 |
NotActions | |
없음 | |
DataActions | |
없음 | |
NotDataActions | |
없음 |
{
"assignableScopes": [
"/"
],
"description": "List cluster user credentials action.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/00493d72-78f6-4148-b6c5-d3ce8e4799dd",
"name": "00493d72-78f6-4148-b6c5-d3ce8e4799dd",
"permissions": [
{
"actions": [
"Microsoft.Resources/deployments/write",
"Microsoft.Resources/subscriptions/operationresults/read",
"Microsoft.Resources/subscriptions/read",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.Kubernetes/connectedClusters/listClusterUserCredentials/action",
"Microsoft.Authorization/*/read",
"Microsoft.Insights/alertRules/*",
"Microsoft.Support/*",
"Microsoft.Kubernetes/connectedClusters/listClusterUserCredential/action"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"roleName": "Azure Arc Enabled Kubernetes Cluster User Role",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Azure Arc Kubernetes 관리자
리소스 할당량 및 네임스페이스 업데이트 또는 삭제를 제외하고 클러스터/네임스페이스의 모든 리소스를 관리할 수 있습니다.
작업 | 설명 |
---|---|
Microsoft.Authorization/*/read | 역할 및 역할 할당 읽기 |
Microsoft.Insights/alertRules/* | 클래식 메트릭 경고를 만들고 관리합니다. |
Microsoft.Resources/deployments/write | 배포를 만들거나 업데이트합니다. |
Microsoft.Resources/subscriptions/operationresults/read | 구독 작업 결과를 가져옵니다. |
Microsoft.Resources/subscriptions/read | 구독 목록을 가져옵니다. |
Microsoft.Resources/subscriptions/resourceGroups/read | 리소스 그룹을 가져오거나 나열합니다. |
Microsoft.Support/* | 지원 티켓을 만들거나 업데이트합니다. |
NotActions | |
없음 | |
DataActions | |
Microsoft.Kubernetes/connectedClusters/apps/controllerrevisions/read | controllerrevisions를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/apps/daemonsets/* | |
Microsoft.Kubernetes/connectedClusters/apps/deployments/* | |
Microsoft.Kubernetes/connectedClusters/apps/복제본(replica)sets/* | |
Microsoft.Kubernetes/connectedClusters/apps/statefulsets/* | |
Microsoft.Kubernetes/connectedClusters/authorization.k8s.io/localsubjectaccessreviews/write | localsubjectaccessreviews를 씁니다. |
Microsoft.Kubernetes/connectedClusters/autoscaling/horizontalpodautoscalers/* | |
Microsoft.Kubernetes/connectedClusters/batch/cronjobs/* | |
Microsoft.Kubernetes/connectedClusters/batch/jobs/* | |
Microsoft.Kubernetes/connectedClusters/configmaps/* | |
Microsoft.Kubernetes/connectedClusters/endpoints/* | |
Microsoft.Kubernetes/connectedClusters/events.k8s.io/events/read | events를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/events/read | events를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/extensions/daemonsets/* | |
Microsoft.Kubernetes/connectedClusters/extensions/deployments/* | |
Microsoft.Kubernetes/connectedClusters/extensions/ingresses/* | |
Microsoft.Kubernetes/connectedClusters/extensions/networkpolicies/* | |
Microsoft.Kubernetes/connectedClusters/extensions/replicasets/* | |
Microsoft.Kubernetes/connectedClusters/limitranges/read | limitranges를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/namespaces/read | 네임스페이스를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/networking.k8s.io/ingresses/* | |
Microsoft.Kubernetes/connectedClusters/networking.k8s.io/networkpolicies/* | |
Microsoft.Kubernetes/connectedClusters/persistentvolumeclaims/* | |
Microsoft.Kubernetes/connectedClusters/pods/* | |
Microsoft.Kubernetes/connectedClusters/policy/poddisruptionbudgets/* | |
Microsoft.Kubernetes/connectedClusters/rbac.authorization.k8s.io/rolebindings/* | |
Microsoft.Kubernetes/connectedClusters/rbac.authorization.k8s.io/roles/* | |
Microsoft.Kubernetes/connectedClusters/replicationcontrollers/* | |
Microsoft.Kubernetes/connectedClusters/replicationcontrollers/* | |
Microsoft.Kubernetes/connectedClusters/resourcequotas/read | resourcequotas를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/secrets/* | |
Microsoft.Kubernetes/connectedClusters/serviceaccounts/* | |
Microsoft.Kubernetes/connectedClusters/services/* | |
NotDataActions | |
없음 |
{
"assignableScopes": [
"/"
],
"description": "Lets you manage all resources under cluster/namespace, except update or delete resource quotas and namespaces.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/dffb1e0c-446f-4dde-a09f-99eb5cc68b96",
"name": "dffb1e0c-446f-4dde-a09f-99eb5cc68b96",
"permissions": [
{
"actions": [
"Microsoft.Authorization/*/read",
"Microsoft.Insights/alertRules/*",
"Microsoft.Resources/deployments/write",
"Microsoft.Resources/subscriptions/operationresults/read",
"Microsoft.Resources/subscriptions/read",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.Support/*"
],
"notActions": [],
"dataActions": [
"Microsoft.Kubernetes/connectedClusters/apps/controllerrevisions/read",
"Microsoft.Kubernetes/connectedClusters/apps/daemonsets/*",
"Microsoft.Kubernetes/connectedClusters/apps/deployments/*",
"Microsoft.Kubernetes/connectedClusters/apps/replicasets/*",
"Microsoft.Kubernetes/connectedClusters/apps/statefulsets/*",
"Microsoft.Kubernetes/connectedClusters/authorization.k8s.io/localsubjectaccessreviews/write",
"Microsoft.Kubernetes/connectedClusters/autoscaling/horizontalpodautoscalers/*",
"Microsoft.Kubernetes/connectedClusters/batch/cronjobs/*",
"Microsoft.Kubernetes/connectedClusters/batch/jobs/*",
"Microsoft.Kubernetes/connectedClusters/configmaps/*",
"Microsoft.Kubernetes/connectedClusters/endpoints/*",
"Microsoft.Kubernetes/connectedClusters/events.k8s.io/events/read",
"Microsoft.Kubernetes/connectedClusters/events/read",
"Microsoft.Kubernetes/connectedClusters/extensions/daemonsets/*",
"Microsoft.Kubernetes/connectedClusters/extensions/deployments/*",
"Microsoft.Kubernetes/connectedClusters/extensions/ingresses/*",
"Microsoft.Kubernetes/connectedClusters/extensions/networkpolicies/*",
"Microsoft.Kubernetes/connectedClusters/extensions/replicasets/*",
"Microsoft.Kubernetes/connectedClusters/limitranges/read",
"Microsoft.Kubernetes/connectedClusters/namespaces/read",
"Microsoft.Kubernetes/connectedClusters/networking.k8s.io/ingresses/*",
"Microsoft.Kubernetes/connectedClusters/networking.k8s.io/networkpolicies/*",
"Microsoft.Kubernetes/connectedClusters/persistentvolumeclaims/*",
"Microsoft.Kubernetes/connectedClusters/pods/*",
"Microsoft.Kubernetes/connectedClusters/policy/poddisruptionbudgets/*",
"Microsoft.Kubernetes/connectedClusters/rbac.authorization.k8s.io/rolebindings/*",
"Microsoft.Kubernetes/connectedClusters/rbac.authorization.k8s.io/roles/*",
"Microsoft.Kubernetes/connectedClusters/replicationcontrollers/*",
"Microsoft.Kubernetes/connectedClusters/replicationcontrollers/*",
"Microsoft.Kubernetes/connectedClusters/resourcequotas/read",
"Microsoft.Kubernetes/connectedClusters/secrets/*",
"Microsoft.Kubernetes/connectedClusters/serviceaccounts/*",
"Microsoft.Kubernetes/connectedClusters/services/*"
],
"notDataActions": []
}
],
"roleName": "Azure Arc Kubernetes Admin",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Azure Arc Kubernetes 클러스터 관리자
클러스터의 모든 리소스를 관리할 수 있습니다.
작업 | 설명 |
---|---|
Microsoft.Authorization/*/read | 역할 및 역할 할당 읽기 |
Microsoft.Insights/alertRules/* | 클래식 메트릭 경고를 만들고 관리합니다. |
Microsoft.Resources/deployments/write | 배포를 만들거나 업데이트합니다. |
Microsoft.Resources/subscriptions/operationresults/read | 구독 작업 결과를 가져옵니다. |
Microsoft.Resources/subscriptions/read | 구독 목록을 가져옵니다. |
Microsoft.Resources/subscriptions/resourceGroups/read | 리소스 그룹을 가져오거나 나열합니다. |
Microsoft.Support/* | 지원 티켓을 만들거나 업데이트합니다. |
NotActions | |
없음 | |
DataActions | |
Microsoft.Kubernetes/connectedClusters/* | |
NotDataActions | |
없음 |
{
"assignableScopes": [
"/"
],
"description": "Lets you manage all resources in the cluster.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/8393591c-06b9-48a2-a542-1bd6b377f6a2",
"name": "8393591c-06b9-48a2-a542-1bd6b377f6a2",
"permissions": [
{
"actions": [
"Microsoft.Authorization/*/read",
"Microsoft.Insights/alertRules/*",
"Microsoft.Resources/deployments/write",
"Microsoft.Resources/subscriptions/operationresults/read",
"Microsoft.Resources/subscriptions/read",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.Support/*"
],
"notActions": [],
"dataActions": [
"Microsoft.Kubernetes/connectedClusters/*"
],
"notDataActions": []
}
],
"roleName": "Azure Arc Kubernetes Cluster Admin",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Azure Arc Kubernetes 뷰어
비밀을 제외하고 클러스터/네임스페이스의 모든 리소스를 볼 수 있습니다.
작업 | 설명 |
---|---|
Microsoft.Authorization/*/read | 역할 및 역할 할당 읽기 |
Microsoft.Insights/alertRules/* | 클래식 메트릭 경고를 만들고 관리합니다. |
Microsoft.Resources/deployments/write | 배포를 만들거나 업데이트합니다. |
Microsoft.Resources/subscriptions/operationresults/read | 구독 작업 결과를 가져옵니다. |
Microsoft.Resources/subscriptions/read | 구독 목록을 가져옵니다. |
Microsoft.Resources/subscriptions/resourceGroups/read | 리소스 그룹을 가져오거나 나열합니다. |
Microsoft.Support/* | 지원 티켓을 만들거나 업데이트합니다. |
NotActions | |
없음 | |
DataActions | |
Microsoft.Kubernetes/connectedClusters/apps/controllerrevisions/read | controllerrevisions를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/apps/daemonsets/read | daemonsets를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/apps/deployments/read | deployments를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/apps/복제본(replica)sets/read | replicasets를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/apps/statefulsets/read | statefulsets를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/autoscaling/horizontalpodautoscalers/read | horizontalpodautoscalers를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/batch/cronjobs/read | cronjobs를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/batch/jobs/read | 작업을 읽습니다. |
Microsoft.Kubernetes/connectedClusters/configmaps/read | configmaps를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/endpoints/read | 엔드포인트를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/events.k8s.io/events/read | events를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/events/read | events를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/extensions/daemonsets/read | daemonsets를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/extensions/deployments/read | deployments를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/extensions/ingresses/read | ingresses를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/extensions/networkpolicies/read | networkpolicies를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/extensions/복제본(replica)sets/read | replicasets를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/limitranges/read | limitranges를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/namespaces/read | 네임스페이스를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/networking.k8s.io/ingresses/read | ingresses를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/networking.k8s.io/networkpolicies/read | networkpolicies를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/persistentvolumeclaims/read | persistentvolumeclaims를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/pods/read | pods를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/policy/poddisruptionbudgets/read | poddisruptionbudgets를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/복제본(replica)tioncontrollers/read | replicationcontrollers를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/복제본(replica)tioncontrollers/read | replicationcontrollers를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/resourcequotas/read | resourcequotas를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/serviceaccounts/read | serviceaccounts를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/services/read | services를 읽습니다. |
NotDataActions | |
없음 |
{
"assignableScopes": [
"/"
],
"description": "Lets you view all resources in cluster/namespace, except secrets.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/63f0a09d-1495-4db4-a681-037d84835eb4",
"name": "63f0a09d-1495-4db4-a681-037d84835eb4",
"permissions": [
{
"actions": [
"Microsoft.Authorization/*/read",
"Microsoft.Insights/alertRules/*",
"Microsoft.Resources/deployments/write",
"Microsoft.Resources/subscriptions/operationresults/read",
"Microsoft.Resources/subscriptions/read",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.Support/*"
],
"notActions": [],
"dataActions": [
"Microsoft.Kubernetes/connectedClusters/apps/controllerrevisions/read",
"Microsoft.Kubernetes/connectedClusters/apps/daemonsets/read",
"Microsoft.Kubernetes/connectedClusters/apps/deployments/read",
"Microsoft.Kubernetes/connectedClusters/apps/replicasets/read",
"Microsoft.Kubernetes/connectedClusters/apps/statefulsets/read",
"Microsoft.Kubernetes/connectedClusters/autoscaling/horizontalpodautoscalers/read",
"Microsoft.Kubernetes/connectedClusters/batch/cronjobs/read",
"Microsoft.Kubernetes/connectedClusters/batch/jobs/read",
"Microsoft.Kubernetes/connectedClusters/configmaps/read",
"Microsoft.Kubernetes/connectedClusters/endpoints/read",
"Microsoft.Kubernetes/connectedClusters/events.k8s.io/events/read",
"Microsoft.Kubernetes/connectedClusters/events/read",
"Microsoft.Kubernetes/connectedClusters/extensions/daemonsets/read",
"Microsoft.Kubernetes/connectedClusters/extensions/deployments/read",
"Microsoft.Kubernetes/connectedClusters/extensions/ingresses/read",
"Microsoft.Kubernetes/connectedClusters/extensions/networkpolicies/read",
"Microsoft.Kubernetes/connectedClusters/extensions/replicasets/read",
"Microsoft.Kubernetes/connectedClusters/limitranges/read",
"Microsoft.Kubernetes/connectedClusters/namespaces/read",
"Microsoft.Kubernetes/connectedClusters/networking.k8s.io/ingresses/read",
"Microsoft.Kubernetes/connectedClusters/networking.k8s.io/networkpolicies/read",
"Microsoft.Kubernetes/connectedClusters/persistentvolumeclaims/read",
"Microsoft.Kubernetes/connectedClusters/pods/read",
"Microsoft.Kubernetes/connectedClusters/policy/poddisruptionbudgets/read",
"Microsoft.Kubernetes/connectedClusters/replicationcontrollers/read",
"Microsoft.Kubernetes/connectedClusters/replicationcontrollers/read",
"Microsoft.Kubernetes/connectedClusters/resourcequotas/read",
"Microsoft.Kubernetes/connectedClusters/serviceaccounts/read",
"Microsoft.Kubernetes/connectedClusters/services/read"
],
"notDataActions": []
}
],
"roleName": "Azure Arc Kubernetes Viewer",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Azure Arc Kubernetes 작성자
(클러스터)역할 및 (클러스터)역할 바인딩을 제외하고 클러스터/네임스페이스의 모든 항목을 업데이트할 수 있습니다.
작업 | 설명 |
---|---|
Microsoft.Authorization/*/read | 역할 및 역할 할당 읽기 |
Microsoft.Insights/alertRules/* | 클래식 메트릭 경고를 만들고 관리합니다. |
Microsoft.Resources/deployments/write | 배포를 만들거나 업데이트합니다. |
Microsoft.Resources/subscriptions/operationresults/read | 구독 작업 결과를 가져옵니다. |
Microsoft.Resources/subscriptions/read | 구독 목록을 가져옵니다. |
Microsoft.Resources/subscriptions/resourceGroups/read | 리소스 그룹을 가져오거나 나열합니다. |
Microsoft.Support/* | 지원 티켓을 만들거나 업데이트합니다. |
NotActions | |
없음 | |
DataActions | |
Microsoft.Kubernetes/connectedClusters/apps/controllerrevisions/read | controllerrevisions를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/apps/daemonsets/* | |
Microsoft.Kubernetes/connectedClusters/apps/deployments/* | |
Microsoft.Kubernetes/connectedClusters/apps/복제본(replica)sets/* | |
Microsoft.Kubernetes/connectedClusters/apps/statefulsets/* | |
Microsoft.Kubernetes/connectedClusters/autoscaling/horizontalpodautoscalers/* | |
Microsoft.Kubernetes/connectedClusters/batch/cronjobs/* | |
Microsoft.Kubernetes/connectedClusters/batch/jobs/* | |
Microsoft.Kubernetes/connectedClusters/configmaps/* | |
Microsoft.Kubernetes/connectedClusters/endpoints/* | |
Microsoft.Kubernetes/connectedClusters/events.k8s.io/events/read | events를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/events/read | events를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/extensions/daemonsets/* | |
Microsoft.Kubernetes/connectedClusters/extensions/deployments/* | |
Microsoft.Kubernetes/connectedClusters/extensions/ingresses/* | |
Microsoft.Kubernetes/connectedClusters/extensions/networkpolicies/* | |
Microsoft.Kubernetes/connectedClusters/extensions/replicasets/* | |
Microsoft.Kubernetes/connectedClusters/limitranges/read | limitranges를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/namespaces/read | 네임스페이스를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/networking.k8s.io/ingresses/* | |
Microsoft.Kubernetes/connectedClusters/networking.k8s.io/networkpolicies/* | |
Microsoft.Kubernetes/connectedClusters/persistentvolumeclaims/* | |
Microsoft.Kubernetes/connectedClusters/pods/* | |
Microsoft.Kubernetes/connectedClusters/policy/poddisruptionbudgets/* | |
Microsoft.Kubernetes/connectedClusters/replicationcontrollers/* | |
Microsoft.Kubernetes/connectedClusters/replicationcontrollers/* | |
Microsoft.Kubernetes/connectedClusters/resourcequotas/read | resourcequotas를 읽습니다. |
Microsoft.Kubernetes/connectedClusters/secrets/* | |
Microsoft.Kubernetes/connectedClusters/serviceaccounts/* | |
Microsoft.Kubernetes/connectedClusters/services/* | |
NotDataActions | |
없음 |
{
"assignableScopes": [
"/"
],
"description": "Lets you update everything in cluster/namespace, except (cluster)roles and (cluster)role bindings.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/5b999177-9696-4545-85c7-50de3797e5a1",
"name": "5b999177-9696-4545-85c7-50de3797e5a1",
"permissions": [
{
"actions": [
"Microsoft.Authorization/*/read",
"Microsoft.Insights/alertRules/*",
"Microsoft.Resources/deployments/write",
"Microsoft.Resources/subscriptions/operationresults/read",
"Microsoft.Resources/subscriptions/read",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.Support/*"
],
"notActions": [],
"dataActions": [
"Microsoft.Kubernetes/connectedClusters/apps/controllerrevisions/read",
"Microsoft.Kubernetes/connectedClusters/apps/daemonsets/*",
"Microsoft.Kubernetes/connectedClusters/apps/deployments/*",
"Microsoft.Kubernetes/connectedClusters/apps/replicasets/*",
"Microsoft.Kubernetes/connectedClusters/apps/statefulsets/*",
"Microsoft.Kubernetes/connectedClusters/autoscaling/horizontalpodautoscalers/*",
"Microsoft.Kubernetes/connectedClusters/batch/cronjobs/*",
"Microsoft.Kubernetes/connectedClusters/batch/jobs/*",
"Microsoft.Kubernetes/connectedClusters/configmaps/*",
"Microsoft.Kubernetes/connectedClusters/endpoints/*",
"Microsoft.Kubernetes/connectedClusters/events.k8s.io/events/read",
"Microsoft.Kubernetes/connectedClusters/events/read",
"Microsoft.Kubernetes/connectedClusters/extensions/daemonsets/*",
"Microsoft.Kubernetes/connectedClusters/extensions/deployments/*",
"Microsoft.Kubernetes/connectedClusters/extensions/ingresses/*",
"Microsoft.Kubernetes/connectedClusters/extensions/networkpolicies/*",
"Microsoft.Kubernetes/connectedClusters/extensions/replicasets/*",
"Microsoft.Kubernetes/connectedClusters/limitranges/read",
"Microsoft.Kubernetes/connectedClusters/namespaces/read",
"Microsoft.Kubernetes/connectedClusters/networking.k8s.io/ingresses/*",
"Microsoft.Kubernetes/connectedClusters/networking.k8s.io/networkpolicies/*",
"Microsoft.Kubernetes/connectedClusters/persistentvolumeclaims/*",
"Microsoft.Kubernetes/connectedClusters/pods/*",
"Microsoft.Kubernetes/connectedClusters/policy/poddisruptionbudgets/*",
"Microsoft.Kubernetes/connectedClusters/replicationcontrollers/*",
"Microsoft.Kubernetes/connectedClusters/replicationcontrollers/*",
"Microsoft.Kubernetes/connectedClusters/resourcequotas/read",
"Microsoft.Kubernetes/connectedClusters/secrets/*",
"Microsoft.Kubernetes/connectedClusters/serviceaccounts/*",
"Microsoft.Kubernetes/connectedClusters/services/*"
],
"notDataActions": []
}
],
"roleName": "Azure Arc Kubernetes Writer",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Azure Kubernetes Fleet Manager 기여자 역할
플릿, 플릿 멤버, 함대 업데이트 전략, 플릿 업데이트 실행 등을 포함하여 Azure Kubernetes Fleet Manager에서 제공하는 Azure 리소스에 대한 읽기/쓰기 권한을 부여합니다.
actions | 설명 |
---|---|
Microsoft.ContainerService/fleets/* | |
Microsoft.Resources/deployments/* | 배포를 만들고 관리합니다. |
NotActions | |
없음 | |
DataActions | |
없음 | |
NotDataActions | |
없음 |
{
"assignableScopes": [
"/"
],
"description": "Grants read/write access to Azure resources provided by Azure Kubernetes Fleet Manager, including fleets, fleet members, fleet update strategies, fleet update runs, etc.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/63bb64ad-9799-4770-b5c3-24ed299a07bf",
"name": "63bb64ad-9799-4770-b5c3-24ed299a07bf",
"permissions": [
{
"actions": [
"Microsoft.ContainerService/fleets/*",
"Microsoft.Resources/deployments/*"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"roleName": "Azure Kubernetes Fleet Manager Contributor Role",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Azure Kubernetes Fleet Manager RBAC 관리자
Fleet 관리형 허브 클러스터의 네임스페이스 내에서 Kubernetes 리소스에 대한 읽기/쓰기 권한을 부여합니다. ResourceQuota 개체와 네임스페이스 개체 자체를 제외하고 네임스페이스 내의 대부분의 개체에 대한 쓰기 권한을 제공합니다. 클러스터 범위에서 이 역할을 적용하면 모든 네임스페이스에 대한 액세스 권한이 부여됩니다.
작업 | 설명 |
---|---|
Microsoft.Authorization/*/read | 역할 및 역할 할당 읽기 |
Microsoft.Resources/subscriptions/operationresults/read | 구독 작업 결과를 가져옵니다. |
Microsoft.Resources/subscriptions/read | 구독 목록을 가져옵니다. |
Microsoft.Resources/subscriptions/resourceGroups/read | 리소스 그룹을 가져오거나 나열합니다. |
Microsoft.ContainerService/fleets/read | 플릿을 가져옵니다. |
Microsoft.ContainerService/fleets/listCredentials/action | 플릿 자격 증명을 나열합니다. |
NotActions | |
없음 | |
DataActions | |
Microsoft.ContainerService/fleets/apps/controllerrevisions/read | controllerrevisions를 읽습니다. |
Microsoft.ContainerService/fleets/apps/daemonsets/* | |
Microsoft.ContainerService/fleets/apps/deployments/* | |
Microsoft.ContainerService/fleets/apps/statefulsets/* | |
Microsoft.ContainerService/fleets/authorization.k8s.io/localsubjectaccessreviews/write | localsubjectaccessreviews를 씁니다. |
Microsoft.ContainerService/fleets/autoscaling/horizontalpodautoscalers/* | |
Microsoft.ContainerService/fleets/batch/cronjobs/* | |
Microsoft.ContainerService/fleets/batch/jobs/* | |
Microsoft.ContainerService/fleets/configmaps/* | |
Microsoft.ContainerService/fleets/endpoints/* | |
Microsoft.ContainerService/fleets/events.k8s.io/events/read | events를 읽습니다. |
Microsoft.ContainerService/fleets/events/read | events를 읽습니다. |
Microsoft.ContainerService/fleets/extensions/daemonsets/* | |
Microsoft.ContainerService/fleets/extensions/deployments/* | |
Microsoft.ContainerService/fleets/extensions/ingresses/* | |
Microsoft.ContainerService/fleets/extensions/networkpolicies/* | |
Microsoft.ContainerService/fleets/limitranges/read | limitranges를 읽습니다. |
Microsoft.ContainerService/fleets/namespaces/read | 네임스페이스를 읽습니다. |
Microsoft.ContainerService/fleets/networking.k8s.io/ingresses/* | |
Microsoft.ContainerService/fleets/networking.k8s.io/networkpolicies/* | |
Microsoft.ContainerService/fleets/persistentvolumeclaims/* | |
Microsoft.ContainerService/fleets/policy/poddisruptionbudgets/* | |
Microsoft.ContainerService/fleets/rbac.authorization.k8s.io/rolebindings/* | |
Microsoft.ContainerService/fleets/rbac.authorization.k8s.io/roles/* | |
Microsoft.ContainerService/fleets/replicationcontrollers/* | |
Microsoft.ContainerService/fleets/replicationcontrollers/* | |
Microsoft.ContainerService/fleets/resourcequotas/read | resourcequotas를 읽습니다. |
Microsoft.ContainerService/fleets/secrets/* | |
Microsoft.ContainerService/fleets/serviceaccounts/* | |
Microsoft.ContainerService/fleets/services/* | |
NotDataActions | |
없음 |
{
"assignableScopes": [
"/"
],
"description": "Grants read/write access to Kubernetes resources within a namespace in the fleet-managed hub cluster - provides write permissions on most objects within a a namespace, with the exception of ResourceQuota object and the namespace object itself. Applying this role at cluster scope will give access across all namespaces.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/434fb43a-c01c-447e-9f67-c3ad923cfaba",
"name": "434fb43a-c01c-447e-9f67-c3ad923cfaba",
"permissions": [
{
"actions": [
"Microsoft.Authorization/*/read",
"Microsoft.Resources/subscriptions/operationresults/read",
"Microsoft.Resources/subscriptions/read",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.ContainerService/fleets/read",
"Microsoft.ContainerService/fleets/listCredentials/action"
],
"notActions": [],
"dataActions": [
"Microsoft.ContainerService/fleets/apps/controllerrevisions/read",
"Microsoft.ContainerService/fleets/apps/daemonsets/*",
"Microsoft.ContainerService/fleets/apps/deployments/*",
"Microsoft.ContainerService/fleets/apps/statefulsets/*",
"Microsoft.ContainerService/fleets/authorization.k8s.io/localsubjectaccessreviews/write",
"Microsoft.ContainerService/fleets/autoscaling/horizontalpodautoscalers/*",
"Microsoft.ContainerService/fleets/batch/cronjobs/*",
"Microsoft.ContainerService/fleets/batch/jobs/*",
"Microsoft.ContainerService/fleets/configmaps/*",
"Microsoft.ContainerService/fleets/endpoints/*",
"Microsoft.ContainerService/fleets/events.k8s.io/events/read",
"Microsoft.ContainerService/fleets/events/read",
"Microsoft.ContainerService/fleets/extensions/daemonsets/*",
"Microsoft.ContainerService/fleets/extensions/deployments/*",
"Microsoft.ContainerService/fleets/extensions/ingresses/*",
"Microsoft.ContainerService/fleets/extensions/networkpolicies/*",
"Microsoft.ContainerService/fleets/limitranges/read",
"Microsoft.ContainerService/fleets/namespaces/read",
"Microsoft.ContainerService/fleets/networking.k8s.io/ingresses/*",
"Microsoft.ContainerService/fleets/networking.k8s.io/networkpolicies/*",
"Microsoft.ContainerService/fleets/persistentvolumeclaims/*",
"Microsoft.ContainerService/fleets/policy/poddisruptionbudgets/*",
"Microsoft.ContainerService/fleets/rbac.authorization.k8s.io/rolebindings/*",
"Microsoft.ContainerService/fleets/rbac.authorization.k8s.io/roles/*",
"Microsoft.ContainerService/fleets/replicationcontrollers/*",
"Microsoft.ContainerService/fleets/replicationcontrollers/*",
"Microsoft.ContainerService/fleets/resourcequotas/read",
"Microsoft.ContainerService/fleets/secrets/*",
"Microsoft.ContainerService/fleets/serviceaccounts/*",
"Microsoft.ContainerService/fleets/services/*"
],
"notDataActions": []
}
],
"roleName": "Azure Kubernetes Fleet Manager RBAC Admin",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Azure Kubernetes Fleet Manager RBAC 클러스터 관리자
플릿 관리형 허브 클러스터의 모든 Kubernetes 리소스에 대한 읽기/쓰기 권한을 부여합니다.
작업 | 설명 |
---|---|
Microsoft.Authorization/*/read | 역할 및 역할 할당 읽기 |
Microsoft.Resources/subscriptions/operationresults/read | 구독 작업 결과를 가져옵니다. |
Microsoft.Resources/subscriptions/read | 구독 목록을 가져옵니다. |
Microsoft.Resources/subscriptions/resourceGroups/read | 리소스 그룹을 가져오거나 나열합니다. |
Microsoft.ContainerService/fleets/read | 플릿을 가져옵니다. |
Microsoft.ContainerService/fleets/listCredentials/action | 플릿 자격 증명을 나열합니다. |
NotActions | |
없음 | |
DataActions | |
Microsoft.ContainerService/fleets/* | |
NotDataActions | |
없음 |
{
"assignableScopes": [
"/"
],
"description": "Grants read/write access to all Kubernetes resources in the fleet-managed hub cluster.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/18ab4d3d-a1bf-4477-8ad9-8359bc988f69",
"name": "18ab4d3d-a1bf-4477-8ad9-8359bc988f69",
"permissions": [
{
"actions": [
"Microsoft.Authorization/*/read",
"Microsoft.Resources/subscriptions/operationresults/read",
"Microsoft.Resources/subscriptions/read",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.ContainerService/fleets/read",
"Microsoft.ContainerService/fleets/listCredentials/action"
],
"notActions": [],
"dataActions": [
"Microsoft.ContainerService/fleets/*"
],
"notDataActions": []
}
],
"roleName": "Azure Kubernetes Fleet Manager RBAC Cluster Admin",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Azure Kubernetes Fleet Manager RBAC 읽기 권한자
Fleet 관리형 허브 클러스터의 네임스페이스 내에서 대부분의 Kubernetes 리소스에 대한 읽기 전용 액세스 권한을 부여합니다. 역할이나 역할 바인딩 보기는 허용되지 않습니다. 비밀의 콘텐츠를 읽으면 네임스페이스의 ServiceAccount 자격 증명에 액세스할 수 있으므로 이 역할은 비밀 보기를 허용하지 않습니다. 그러면 네임스페이스의 모든 ServiceAccount로 API 액세스가 허용됩니다(권한 상승의 한 형태). 클러스터 범위에서 이 역할을 적용하면 모든 네임스페이스에 대한 액세스 권한이 부여됩니다.
작업 | 설명 |
---|---|
Microsoft.Authorization/*/read | 역할 및 역할 할당 읽기 |
Microsoft.Resources/subscriptions/operationresults/read | 구독 작업 결과를 가져옵니다. |
Microsoft.Resources/subscriptions/read | 구독 목록을 가져옵니다. |
Microsoft.Resources/subscriptions/resourceGroups/read | 리소스 그룹을 가져오거나 나열합니다. |
Microsoft.ContainerService/fleets/read | 플릿을 가져옵니다. |
Microsoft.ContainerService/fleets/listCredentials/action | 플릿 자격 증명을 나열합니다. |
NotActions | |
없음 | |
DataActions | |
Microsoft.ContainerService/fleets/apps/controllerrevisions/read | controllerrevisions를 읽습니다. |
Microsoft.ContainerService/fleets/apps/daemonsets/read | daemonsets를 읽습니다. |
Microsoft.ContainerService/fleets/apps/deployments/read | deployments를 읽습니다. |
Microsoft.ContainerService/fleets/apps/statefulsets/read | statefulsets를 읽습니다. |
Microsoft.ContainerService/fleets/autoscaling/horizontalpodautoscalers/read | horizontalpodautoscalers를 읽습니다. |
Microsoft.ContainerService/fleets/batch/cronjobs/read | cronjobs를 읽습니다. |
Microsoft.ContainerService/fleets/batch/jobs/read | 작업을 읽습니다. |
Microsoft.ContainerService/fleets/configmaps/read | configmaps를 읽습니다. |
Microsoft.ContainerService/fleets/endpoints/read | 엔드포인트를 읽습니다. |
Microsoft.ContainerService/fleets/events.k8s.io/events/read | events를 읽습니다. |
Microsoft.ContainerService/fleets/events/read | events를 읽습니다. |
Microsoft.ContainerService/fleets/extensions/daemonsets/read | daemonsets를 읽습니다. |
Microsoft.ContainerService/fleets/extensions/deployments/read | deployments를 읽습니다. |
Microsoft.ContainerService/fleets/extensions/ingresses/read | ingresses를 읽습니다. |
Microsoft.ContainerService/fleets/extensions/networkpolicies/read | networkpolicies를 읽습니다. |
Microsoft.ContainerService/fleets/limitranges/read | limitranges를 읽습니다. |
Microsoft.ContainerService/fleets/namespaces/read | 네임스페이스를 읽습니다. |
Microsoft.ContainerService/fleets/networking.k8s.io/ingresses/read | ingresses를 읽습니다. |
Microsoft.ContainerService/fleets/networking.k8s.io/networkpolicies/read | networkpolicies를 읽습니다. |
Microsoft.ContainerService/fleets/persistentvolumeclaims/read | persistentvolumeclaims를 읽습니다. |
Microsoft.ContainerService/fleets/policy/poddisruptionbudgets/read | poddisruptionbudgets를 읽습니다. |
Microsoft.ContainerService/fleets/replicationcontrollers/read | replicationcontrollers를 읽습니다. |
Microsoft.ContainerService/fleets/replicationcontrollers/read | replicationcontrollers를 읽습니다. |
Microsoft.ContainerService/fleets/resourcequotas/read | resourcequotas를 읽습니다. |
Microsoft.ContainerService/fleets/serviceaccounts/read | serviceaccounts를 읽습니다. |
Microsoft.ContainerService/fleets/services/read | services를 읽습니다. |
NotDataActions | |
없음 |
{
"assignableScopes": [
"/"
],
"description": "Grants read-only access to most Kubernetes resources within a namespace in the fleet-managed hub cluster. It does not allow viewing roles or role bindings. This role does not allow viewing Secrets, since reading the contents of Secrets enables access to ServiceAccount credentials in the namespace, which would allow API access as any ServiceAccount in the namespace (a form of privilege escalation). Applying this role at cluster scope will give access across all namespaces.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/30b27cfc-9c84-438e-b0ce-70e35255df80",
"name": "30b27cfc-9c84-438e-b0ce-70e35255df80",
"permissions": [
{
"actions": [
"Microsoft.Authorization/*/read",
"Microsoft.Resources/subscriptions/operationresults/read",
"Microsoft.Resources/subscriptions/read",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.ContainerService/fleets/read",
"Microsoft.ContainerService/fleets/listCredentials/action"
],
"notActions": [],
"dataActions": [
"Microsoft.ContainerService/fleets/apps/controllerrevisions/read",
"Microsoft.ContainerService/fleets/apps/daemonsets/read",
"Microsoft.ContainerService/fleets/apps/deployments/read",
"Microsoft.ContainerService/fleets/apps/statefulsets/read",
"Microsoft.ContainerService/fleets/autoscaling/horizontalpodautoscalers/read",
"Microsoft.ContainerService/fleets/batch/cronjobs/read",
"Microsoft.ContainerService/fleets/batch/jobs/read",
"Microsoft.ContainerService/fleets/configmaps/read",
"Microsoft.ContainerService/fleets/endpoints/read",
"Microsoft.ContainerService/fleets/events.k8s.io/events/read",
"Microsoft.ContainerService/fleets/events/read",
"Microsoft.ContainerService/fleets/extensions/daemonsets/read",
"Microsoft.ContainerService/fleets/extensions/deployments/read",
"Microsoft.ContainerService/fleets/extensions/ingresses/read",
"Microsoft.ContainerService/fleets/extensions/networkpolicies/read",
"Microsoft.ContainerService/fleets/limitranges/read",
"Microsoft.ContainerService/fleets/namespaces/read",
"Microsoft.ContainerService/fleets/networking.k8s.io/ingresses/read",
"Microsoft.ContainerService/fleets/networking.k8s.io/networkpolicies/read",
"Microsoft.ContainerService/fleets/persistentvolumeclaims/read",
"Microsoft.ContainerService/fleets/policy/poddisruptionbudgets/read",
"Microsoft.ContainerService/fleets/replicationcontrollers/read",
"Microsoft.ContainerService/fleets/replicationcontrollers/read",
"Microsoft.ContainerService/fleets/resourcequotas/read",
"Microsoft.ContainerService/fleets/serviceaccounts/read",
"Microsoft.ContainerService/fleets/services/read"
],
"notDataActions": []
}
],
"roleName": "Azure Kubernetes Fleet Manager RBAC Reader",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Azure Kubernetes Fleet Manager RBAC 작성자
Fleet 관리형 허브 클러스터의 네임스페이스 내에서 대부분의 Kubernetes 리소스에 대한 읽기/쓰기 권한을 부여합니다. 이 역할은 보기 또는 수정 역할 또는 역할 바인딩을 허용하지 않습니다. 그러나 이 역할을 사용하여 네임스페이스의 ServiceAccount로 비밀에 액세스할 수 있으므로 네임스페이스에 있는 모든 ServiceAccount의 API 액세스 수준을 얻을 수 있습니다. 클러스터 범위에서 이 역할을 적용하면 모든 네임스페이스에 대한 액세스 권한이 부여됩니다.
작업 | 설명 |
---|---|
Microsoft.Authorization/*/read | 역할 및 역할 할당 읽기 |
Microsoft.Resources/subscriptions/operationresults/read | 구독 작업 결과를 가져옵니다. |
Microsoft.Resources/subscriptions/read | 구독 목록을 가져옵니다. |
Microsoft.Resources/subscriptions/resourceGroups/read | 리소스 그룹을 가져오거나 나열합니다. |
Microsoft.ContainerService/fleets/read | 플릿을 가져옵니다. |
Microsoft.ContainerService/fleets/listCredentials/action | 플릿 자격 증명을 나열합니다. |
NotActions | |
없음 | |
DataActions | |
Microsoft.ContainerService/fleets/apps/controllerrevisions/read | controllerrevisions를 읽습니다. |
Microsoft.ContainerService/fleets/apps/daemonsets/* | |
Microsoft.ContainerService/fleets/apps/deployments/* | |
Microsoft.ContainerService/fleets/apps/statefulsets/* | |
Microsoft.ContainerService/fleets/autoscaling/horizontalpodautoscalers/* | |
Microsoft.ContainerService/fleets/batch/cronjobs/* | |
Microsoft.ContainerService/fleets/batch/jobs/* | |
Microsoft.ContainerService/fleets/configmaps/* | |
Microsoft.ContainerService/fleets/endpoints/* | |
Microsoft.ContainerService/fleets/events.k8s.io/events/read | events를 읽습니다. |
Microsoft.ContainerService/fleets/events/read | events를 읽습니다. |
Microsoft.ContainerService/fleets/extensions/daemonsets/* | |
Microsoft.ContainerService/fleets/extensions/deployments/* | |
Microsoft.ContainerService/fleets/extensions/ingresses/* | |
Microsoft.ContainerService/fleets/extensions/networkpolicies/* | |
Microsoft.ContainerService/fleets/limitranges/read | limitranges를 읽습니다. |
Microsoft.ContainerService/fleets/namespaces/read | 네임스페이스를 읽습니다. |
Microsoft.ContainerService/fleets/networking.k8s.io/ingresses/* | |
Microsoft.ContainerService/fleets/networking.k8s.io/networkpolicies/* | |
Microsoft.ContainerService/fleets/persistentvolumeclaims/* | |
Microsoft.ContainerService/fleets/policy/poddisruptionbudgets/* | |
Microsoft.ContainerService/fleets/replicationcontrollers/* | |
Microsoft.ContainerService/fleets/replicationcontrollers/* | |
Microsoft.ContainerService/fleets/resourcequotas/read | resourcequotas를 읽습니다. |
Microsoft.ContainerService/fleets/secrets/* | |
Microsoft.ContainerService/fleets/serviceaccounts/* | |
Microsoft.ContainerService/fleets/services/* | |
NotDataActions | |
없음 |
{
"assignableScopes": [
"/"
],
"description": "Grants read/write access to most Kubernetes resources within a namespace in the fleet-managed hub cluster. This role does not allow viewing or modifying roles or role bindings. However, this role allows accessing Secrets as any ServiceAccount in the namespace, so it can be used to gain the API access levels of any ServiceAccount in the namespace. Applying this role at cluster scope will give access across all namespaces.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/5af6afb3-c06c-4fa4-8848-71a8aee05683",
"name": "5af6afb3-c06c-4fa4-8848-71a8aee05683",
"permissions": [
{
"actions": [
"Microsoft.Authorization/*/read",
"Microsoft.Resources/subscriptions/operationresults/read",
"Microsoft.Resources/subscriptions/read",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.ContainerService/fleets/read",
"Microsoft.ContainerService/fleets/listCredentials/action"
],
"notActions": [],
"dataActions": [
"Microsoft.ContainerService/fleets/apps/controllerrevisions/read",
"Microsoft.ContainerService/fleets/apps/daemonsets/*",
"Microsoft.ContainerService/fleets/apps/deployments/*",
"Microsoft.ContainerService/fleets/apps/statefulsets/*",
"Microsoft.ContainerService/fleets/autoscaling/horizontalpodautoscalers/*",
"Microsoft.ContainerService/fleets/batch/cronjobs/*",
"Microsoft.ContainerService/fleets/batch/jobs/*",
"Microsoft.ContainerService/fleets/configmaps/*",
"Microsoft.ContainerService/fleets/endpoints/*",
"Microsoft.ContainerService/fleets/events.k8s.io/events/read",
"Microsoft.ContainerService/fleets/events/read",
"Microsoft.ContainerService/fleets/extensions/daemonsets/*",
"Microsoft.ContainerService/fleets/extensions/deployments/*",
"Microsoft.ContainerService/fleets/extensions/ingresses/*",
"Microsoft.ContainerService/fleets/extensions/networkpolicies/*",
"Microsoft.ContainerService/fleets/limitranges/read",
"Microsoft.ContainerService/fleets/namespaces/read",
"Microsoft.ContainerService/fleets/networking.k8s.io/ingresses/*",
"Microsoft.ContainerService/fleets/networking.k8s.io/networkpolicies/*",
"Microsoft.ContainerService/fleets/persistentvolumeclaims/*",
"Microsoft.ContainerService/fleets/policy/poddisruptionbudgets/*",
"Microsoft.ContainerService/fleets/replicationcontrollers/*",
"Microsoft.ContainerService/fleets/replicationcontrollers/*",
"Microsoft.ContainerService/fleets/resourcequotas/read",
"Microsoft.ContainerService/fleets/secrets/*",
"Microsoft.ContainerService/fleets/serviceaccounts/*",
"Microsoft.ContainerService/fleets/services/*"
],
"notDataActions": []
}
],
"roleName": "Azure Kubernetes Fleet Manager RBAC Writer",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Azure Kubernetes Service 클러스터 관리자 역할
클러스터 관리자 자격 증명 작업을 나열합니다.
작업 | 설명 |
---|---|
Microsoft.ContainerService/managedClusters/listCluster관리Credential/action | 관리형 클러스터의 클러스터관리 자격 증명 나열 |
Microsoft.ContainerService/managedClusters/accessProfiles/listCredential/action | 목록 자격 증명을 사용하여 역할 이름으로 관리형 클러스터 액세스 프로필 가져오기 |
Microsoft.ContainerService/managedClusters/read | 관리형 클러스터 가져오기 |
Microsoft.ContainerService/managedClusters/runcommand/action | 관리되는 kubernetes 서버에 대해 사용자가 실행한 명령을 실행합니다. |
NotActions | |
없음 | |
DataActions | |
없음 | |
NotDataActions | |
없음 |
{
"assignableScopes": [
"/"
],
"description": "List cluster admin credential action.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/0ab0b1a8-8aac-4efd-b8c2-3ee1fb270be8",
"name": "0ab0b1a8-8aac-4efd-b8c2-3ee1fb270be8",
"permissions": [
{
"actions": [
"Microsoft.ContainerService/managedClusters/listClusterAdminCredential/action",
"Microsoft.ContainerService/managedClusters/accessProfiles/listCredential/action",
"Microsoft.ContainerService/managedClusters/read",
"Microsoft.ContainerService/managedClusters/runcommand/action"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"roleName": "Azure Kubernetes Service Cluster Admin Role",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Azure Kubernetes Service 클러스터 모니터링 사용자
클러스터 모니터링 사용자 자격 증명 작업을 나열합니다.
actions | 설명 |
---|---|
Microsoft.ContainerService/managedClusters/listClusterMonitoringUserCredential/action | 관리형 클러스터의 clusterMonitoringUser 자격 증명을 나열합니다. |
Microsoft.ContainerService/managedClusters/read | 관리형 클러스터 가져오기 |
NotActions | |
없음 | |
DataActions | |
없음 | |
NotDataActions | |
없음 |
{
"assignableScopes": [
"/"
],
"description": "List cluster monitoring user credential action.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/1afdec4b-e479-420e-99e7-f82237c7c5e6",
"name": "1afdec4b-e479-420e-99e7-f82237c7c5e6",
"permissions": [
{
"actions": [
"Microsoft.ContainerService/managedClusters/listClusterMonitoringUserCredential/action",
"Microsoft.ContainerService/managedClusters/read"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"roleName": "Azure Kubernetes Service Cluster Monitoring User",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Azure Kubernetes Service 클러스터 사용자 역할
클러스터 사용자 자격 증명 작업을 나열합니다.
작업 | 설명 |
---|---|
Microsoft.ContainerService/managedClusters/listClusterUserCredential/action | 관리형 클러스터의 clusterUser 자격 증명 나열 |
Microsoft.ContainerService/managedClusters/read | 관리형 클러스터 가져오기 |
NotActions | |
없음 | |
DataActions | |
없음 | |
NotDataActions | |
없음 |
{
"assignableScopes": [
"/"
],
"description": "List cluster user credential action.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/4abbcc35-e782-43d8-92c5-2d3f1bd2253f",
"name": "4abbcc35-e782-43d8-92c5-2d3f1bd2253f",
"permissions": [
{
"actions": [
"Microsoft.ContainerService/managedClusters/listClusterUserCredential/action",
"Microsoft.ContainerService/managedClusters/read"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"roleName": "Azure Kubernetes Service Cluster User Role",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Azure Kubernetes Service 기여자 역할
Azure Kubernetes Service 클러스터를 읽고 쓰기 위한 액세스 권한을 부여합니다.
작업 | 설명 |
---|---|
Microsoft.ContainerService/managedClusters/read | 관리형 클러스터 가져오기 |
Microsoft.ContainerService/managedClusters/write | 새 관리형 클러스터를 만들거나 기존 클러스터를 업데이트합니다. |
Microsoft.Resources/deployments/* | 배포를 만들고 관리합니다. |
NotActions | |
없음 | |
DataActions | |
없음 | |
NotDataActions | |
없음 |
{
"assignableScopes": [
"/"
],
"description": "Grants access to read and write Azure Kubernetes Service clusters",
"id": "/providers/Microsoft.Authorization/roleDefinitions/ed7f3fbd-7b88-4dd4-9017-9adb7ce333f8",
"name": "ed7f3fbd-7b88-4dd4-9017-9adb7ce333f8",
"permissions": [
{
"actions": [
"Microsoft.ContainerService/managedClusters/read",
"Microsoft.ContainerService/managedClusters/write",
"Microsoft.Resources/deployments/*"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"roleName": "Azure Kubernetes Service Contributor Role",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Azure Kubernetes Service RBAC 관리자
리소스 할당량 및 네임스페이스 업데이트 또는 삭제를 제외하고 클러스터/네임스페이스의 모든 리소스를 관리할 수 있습니다.
작업 | 설명 |
---|---|
Microsoft.Authorization/*/read | 역할 및 역할 할당 읽기 |
Microsoft.Resources/subscriptions/operationresults/read | 구독 작업 결과를 가져옵니다. |
Microsoft.Resources/subscriptions/read | 구독 목록을 가져옵니다. |
Microsoft.Resources/subscriptions/resourceGroups/read | 리소스 그룹을 가져오거나 나열합니다. |
Microsoft.ContainerService/managedClusters/listClusterUserCredential/action | 관리형 클러스터의 clusterUser 자격 증명 나열 |
NotActions | |
없음 | |
DataActions | |
Microsoft.ContainerService/managedClusters/* | |
NotDataActions | |
Microsoft.ContainerService/managedClusters/resourcequotas/write | resourcequotas를 씁니다. |
Microsoft.ContainerService/managedClusters/resourcequotas/delete | resourcequotas를 삭제합니다. |
Microsoft.ContainerService/managedClusters/namespaces/write | 네임스페이스를 씁니다. |
Microsoft.ContainerService/managedClusters/namespaces/delete | 네임스페이스를 삭제합니다. |
{
"assignableScopes": [
"/"
],
"description": "Lets you manage all resources under cluster/namespace, except update or delete resource quotas and namespaces.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/3498e952-d568-435e-9b2c-8d77e338d7f7",
"name": "3498e952-d568-435e-9b2c-8d77e338d7f7",
"permissions": [
{
"actions": [
"Microsoft.Authorization/*/read",
"Microsoft.Resources/subscriptions/operationresults/read",
"Microsoft.Resources/subscriptions/read",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.ContainerService/managedClusters/listClusterUserCredential/action"
],
"notActions": [],
"dataActions": [
"Microsoft.ContainerService/managedClusters/*"
],
"notDataActions": [
"Microsoft.ContainerService/managedClusters/resourcequotas/write",
"Microsoft.ContainerService/managedClusters/resourcequotas/delete",
"Microsoft.ContainerService/managedClusters/namespaces/write",
"Microsoft.ContainerService/managedClusters/namespaces/delete"
]
}
],
"roleName": "Azure Kubernetes Service RBAC Admin",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Azure Kubernetes Service RBAC 클러스터 관리자
클러스터의 모든 리소스를 관리할 수 있습니다.
작업 | 설명 |
---|---|
Microsoft.Authorization/*/read | 역할 및 역할 할당 읽기 |
Microsoft.Resources/subscriptions/operationresults/read | 구독 작업 결과를 가져옵니다. |
Microsoft.Resources/subscriptions/read | 구독 목록을 가져옵니다. |
Microsoft.Resources/subscriptions/resourceGroups/read | 리소스 그룹을 가져오거나 나열합니다. |
Microsoft.ContainerService/managedClusters/listClusterUserCredential/action | 관리형 클러스터의 clusterUser 자격 증명 나열 |
NotActions | |
없음 | |
DataActions | |
Microsoft.ContainerService/managedClusters/* | |
NotDataActions | |
없음 |
{
"assignableScopes": [
"/"
],
"description": "Lets you manage all resources in the cluster.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/b1ff04bb-8a4e-4dc4-8eb5-8693973ce19b",
"name": "b1ff04bb-8a4e-4dc4-8eb5-8693973ce19b",
"permissions": [
{
"actions": [
"Microsoft.Authorization/*/read",
"Microsoft.Resources/subscriptions/operationresults/read",
"Microsoft.Resources/subscriptions/read",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.ContainerService/managedClusters/listClusterUserCredential/action"
],
"notActions": [],
"dataActions": [
"Microsoft.ContainerService/managedClusters/*"
],
"notDataActions": []
}
],
"roleName": "Azure Kubernetes Service RBAC Cluster Admin",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Azure Kubernetes Service RBAC 읽기 권한자
네임스페이스에 있는 대부분의 개체를 볼 수 있는 읽기 전용 권한을 허용합니다. 역할이나 역할 바인딩 보기는 허용되지 않습니다. 비밀의 콘텐츠를 읽으면 네임스페이스의 ServiceAccount 자격 증명에 액세스할 수 있으므로 이 역할은 비밀 보기를 허용하지 않습니다. 그러면 네임스페이스의 모든 ServiceAccount로 API 액세스가 허용됩니다(권한 상승의 한 형태). 클러스터 범위에서 이 역할을 적용하면 모든 네임스페이스에 대한 액세스 권한이 부여됩니다.
작업 | 설명 |
---|---|
Microsoft.Authorization/*/read | 역할 및 역할 할당 읽기 |
Microsoft.Resources/subscriptions/operationresults/read | 구독 작업 결과를 가져옵니다. |
Microsoft.Resources/subscriptions/read | 구독 목록을 가져옵니다. |
Microsoft.Resources/subscriptions/resourceGroups/read | 리소스 그룹을 가져오거나 나열합니다. |
NotActions | |
없음 | |
DataActions | |
Microsoft.ContainerService/managedClusters/apps/controllerrevisions/read | controllerrevisions를 읽습니다. |
Microsoft.ContainerService/managedClusters/apps/daemonsets/read | daemonsets를 읽습니다. |
Microsoft.ContainerService/managedClusters/apps/deployments/read | deployments를 읽습니다. |
Microsoft.ContainerService/managedClusters/apps/복제본(replica)sets/read | replicasets를 읽습니다. |
Microsoft.ContainerService/managedClusters/apps/statefulsets/read | statefulsets를 읽습니다. |
Microsoft.ContainerService/managedClusters/autoscaling/horizontalpodautoscalers/read | horizontalpodautoscalers를 읽습니다. |
Microsoft.ContainerService/managedClusters/batch/cronjobs/read | cronjobs를 읽습니다. |
Microsoft.ContainerService/managedClusters/batch/jobs/read | 작업을 읽습니다. |
Microsoft.ContainerService/managedClusters/configmaps/read | configmaps를 읽습니다. |
Microsoft.ContainerService/managedClusters/discovery.k8s.io/endpointslices/read | 엔드포인트를 읽습니다. |
Microsoft.ContainerService/managedClusters/endpoints/read | 엔드포인트를 읽습니다. |
Microsoft.ContainerService/managedClusters/events.k8s.io/events/read | events를 읽습니다. |
Microsoft.ContainerService/managedClusters/events/read | events를 읽습니다. |
Microsoft.ContainerService/managedClusters/extensions/daemonsets/read | daemonsets를 읽습니다. |
Microsoft.ContainerService/managedClusters/extensions/deployments/read | deployments를 읽습니다. |
Microsoft.ContainerService/managedClusters/extensions/ingresses/read | ingresses를 읽습니다. |
Microsoft.ContainerService/managedClusters/extensions/networkpolicies/read | networkpolicies를 읽습니다. |
Microsoft.ContainerService/managedClusters/extensions/복제본(replica)sets/read | replicasets를 읽습니다. |
Microsoft.ContainerService/managedClusters/limitranges/read | limitranges를 읽습니다. |
Microsoft.ContainerService/managedClusters/metrics.k8s.io/pods/read | pods를 읽습니다. |
Microsoft.ContainerService/managedClusters/metrics.k8s.io/nodes/read | nodes를 읽습니다. |
Microsoft.ContainerService/managedClusters/namespaces/read | 네임스페이스를 읽습니다. |
Microsoft.ContainerService/managedClusters/networking.k8s.io/ingresses/read | ingresses를 읽습니다. |
Microsoft.ContainerService/managedClusters/networking.k8s.io/networkpolicies/read | networkpolicies를 읽습니다. |
Microsoft.ContainerService/managedClusters/persistentvolumeclaims/read | persistentvolumeclaims를 읽습니다. |
Microsoft.ContainerService/managedClusters/pods/read | pods를 읽습니다. |
Microsoft.ContainerService/managedClusters/policy/poddisruptionbudgets/read | poddisruptionbudgets를 읽습니다. |
Microsoft.ContainerService/managedClusters/replicationcontrollers/read | replicationcontrollers를 읽습니다. |
Microsoft.ContainerService/managedClusters/resourcequotas/read | resourcequotas를 읽습니다. |
Microsoft.ContainerService/managedClusters/serviceaccounts/read | serviceaccounts를 읽습니다. |
Microsoft.ContainerService/managedClusters/services/read | services를 읽습니다. |
NotDataActions | |
없음 |
{
"assignableScopes": [
"/"
],
"description": "Allows read-only access to see most objects in a namespace. It does not allow viewing roles or role bindings. This role does not allow viewing Secrets, since reading the contents of Secrets enables access to ServiceAccount credentials in the namespace, which would allow API access as any ServiceAccount in the namespace (a form of privilege escalation). Applying this role at cluster scope will give access across all namespaces.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/7f6c6a51-bcf8-42ba-9220-52d62157d7db",
"name": "7f6c6a51-bcf8-42ba-9220-52d62157d7db",
"permissions": [
{
"actions": [
"Microsoft.Authorization/*/read",
"Microsoft.Resources/subscriptions/operationresults/read",
"Microsoft.Resources/subscriptions/read",
"Microsoft.Resources/subscriptions/resourceGroups/read"
],
"notActions": [],
"dataActions": [
"Microsoft.ContainerService/managedClusters/apps/controllerrevisions/read",
"Microsoft.ContainerService/managedClusters/apps/daemonsets/read",
"Microsoft.ContainerService/managedClusters/apps/deployments/read",
"Microsoft.ContainerService/managedClusters/apps/replicasets/read",
"Microsoft.ContainerService/managedClusters/apps/statefulsets/read",
"Microsoft.ContainerService/managedClusters/autoscaling/horizontalpodautoscalers/read",
"Microsoft.ContainerService/managedClusters/batch/cronjobs/read",
"Microsoft.ContainerService/managedClusters/batch/jobs/read",
"Microsoft.ContainerService/managedClusters/configmaps/read",
"Microsoft.ContainerService/managedClusters/discovery.k8s.io/endpointslices/read",
"Microsoft.ContainerService/managedClusters/endpoints/read",
"Microsoft.ContainerService/managedClusters/events.k8s.io/events/read",
"Microsoft.ContainerService/managedClusters/events/read",
"Microsoft.ContainerService/managedClusters/extensions/daemonsets/read",
"Microsoft.ContainerService/managedClusters/extensions/deployments/read",
"Microsoft.ContainerService/managedClusters/extensions/ingresses/read",
"Microsoft.ContainerService/managedClusters/extensions/networkpolicies/read",
"Microsoft.ContainerService/managedClusters/extensions/replicasets/read",
"Microsoft.ContainerService/managedClusters/limitranges/read",
"Microsoft.ContainerService/managedClusters/metrics.k8s.io/pods/read",
"Microsoft.ContainerService/managedClusters/metrics.k8s.io/nodes/read",
"Microsoft.ContainerService/managedClusters/namespaces/read",
"Microsoft.ContainerService/managedClusters/networking.k8s.io/ingresses/read",
"Microsoft.ContainerService/managedClusters/networking.k8s.io/networkpolicies/read",
"Microsoft.ContainerService/managedClusters/persistentvolumeclaims/read",
"Microsoft.ContainerService/managedClusters/pods/read",
"Microsoft.ContainerService/managedClusters/policy/poddisruptionbudgets/read",
"Microsoft.ContainerService/managedClusters/replicationcontrollers/read",
"Microsoft.ContainerService/managedClusters/resourcequotas/read",
"Microsoft.ContainerService/managedClusters/serviceaccounts/read",
"Microsoft.ContainerService/managedClusters/services/read"
],
"notDataActions": []
}
],
"roleName": "Azure Kubernetes Service RBAC Reader",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Azure Kubernetes Service RBAC 쓰기 권한자
네임스페이스에 있는 대부분의 개체에 대해 읽기/쓰기 액세스 권한을 허용합니다. 이 역할은 보기 또는 수정 역할 또는 역할 바인딩을 허용하지 않습니다. 하지만 이 역할을 사용하면 네임스페이스의 모든 ServiceAccount로 보안 비밀에 액세스하고 Pod를 실행할 수 있으므로 네임스페이스에 있는 모든 ServiceAccount의 API 액세스 수준을 얻는 데 사용할 수 있습니다. 클러스터 범위에서 이 역할을 적용하면 모든 네임스페이스에 대한 액세스 권한이 부여됩니다.
작업 | 설명 |
---|---|
Microsoft.Authorization/*/read | 역할 및 역할 할당 읽기 |
Microsoft.Resources/subscriptions/operationresults/read | 구독 작업 결과를 가져옵니다. |
Microsoft.Resources/subscriptions/read | 구독 목록을 가져옵니다. |
Microsoft.Resources/subscriptions/resourceGroups/read | 리소스 그룹을 가져오거나 나열합니다. |
NotActions | |
없음 | |
DataActions | |
Microsoft.ContainerService/managedClusters/apps/controllerrevisions/read | controllerrevisions를 읽습니다. |
Microsoft.ContainerService/managedClusters/apps/daemonsets/* | |
Microsoft.ContainerService/managedClusters/apps/deployments/* | |
Microsoft.ContainerService/managedClusters/apps/복제본(replica)sets/* | |
Microsoft.ContainerService/managedClusters/apps/statefulsets/* | |
Microsoft.ContainerService/managedClusters/autoscaling/horizontalpodautoscalers/* | |
Microsoft.ContainerService/managedClusters/batch/cronjobs/* | |
Microsoft.ContainerService/managedClusters/coordination.k8s.io/leases/read | 임대를 읽습니다. |
Microsoft.ContainerService/managedClusters/coordination.k8s.io/leases/write | 임대를 씁니다. |
Microsoft.ContainerService/managedClusters/coordination.k8s.io/leases/delete | 임대를 삭제합니다. |
Microsoft.ContainerService/managedClusters/discovery.k8s.io/endpointslices/read | 엔드포인트를 읽습니다. |
Microsoft.ContainerService/managedClusters/batch/jobs/* | |
Microsoft.ContainerService/managedClusters/configmaps/* | |
Microsoft.ContainerService/managedClusters/endpoints/* | |
Microsoft.ContainerService/managedClusters/events.k8s.io/events/read | events를 읽습니다. |
Microsoft.ContainerService/managedClusters/events/* | |
Microsoft.ContainerService/managedClusters/extensions/daemonsets/* | |
Microsoft.ContainerService/managedClusters/extensions/deployments/* | |
Microsoft.ContainerService/managedClusters/extensions/ingresses/* | |
Microsoft.ContainerService/managedClusters/extensions/networkpolicies/* | |
Microsoft.ContainerService/managedClusters/extensions/복제본(replica)sets/* | |
Microsoft.ContainerService/managedClusters/limitranges/read | limitranges를 읽습니다. |
Microsoft.ContainerService/managedClusters/metrics.k8s.io/pods/read | pods를 읽습니다. |
Microsoft.ContainerService/managedClusters/metrics.k8s.io/nodes/read | nodes를 읽습니다. |
Microsoft.ContainerService/managedClusters/namespaces/read | 네임스페이스를 읽습니다. |
Microsoft.ContainerService/managedClusters/networking.k8s.io/ingresses/* | |
Microsoft.ContainerService/managedClusters/networking.k8s.io/networkpolicies/* | |
Microsoft.ContainerService/managedClusters/persistentvolumeclaims/* | |
Microsoft.ContainerService/managedClusters/pods/* | |
Microsoft.ContainerService/managedClusters/policy/poddisruptionbudgets/* | |
Microsoft.ContainerService/managedClusters/replicationcontrollers/* | |
Microsoft.ContainerService/managedClusters/resourcequotas/read | resourcequotas를 읽습니다. |
Microsoft.ContainerService/managedClusters/secrets/* | |
Microsoft.ContainerService/managedClusters/serviceaccounts/* | |
Microsoft.ContainerService/managedClusters/services/* | |
NotDataActions | |
없음 |
{
"assignableScopes": [
"/"
],
"description": "Allows read/write access to most objects in a namespace.This role does not allow viewing or modifying roles or role bindings. However, this role allows accessing Secrets and running Pods as any ServiceAccount in the namespace, so it can be used to gain the API access levels of any ServiceAccount in the namespace. Applying this role at cluster scope will give access across all namespaces.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/a7ffa36f-339b-4b5c-8bdf-e2c188b2c0eb",
"name": "a7ffa36f-339b-4b5c-8bdf-e2c188b2c0eb",
"permissions": [
{
"actions": [
"Microsoft.Authorization/*/read",
"Microsoft.Resources/subscriptions/operationresults/read",
"Microsoft.Resources/subscriptions/read",
"Microsoft.Resources/subscriptions/resourceGroups/read"
],
"notActions": [],
"dataActions": [
"Microsoft.ContainerService/managedClusters/apps/controllerrevisions/read",
"Microsoft.ContainerService/managedClusters/apps/daemonsets/*",
"Microsoft.ContainerService/managedClusters/apps/deployments/*",
"Microsoft.ContainerService/managedClusters/apps/replicasets/*",
"Microsoft.ContainerService/managedClusters/apps/statefulsets/*",
"Microsoft.ContainerService/managedClusters/autoscaling/horizontalpodautoscalers/*",
"Microsoft.ContainerService/managedClusters/batch/cronjobs/*",
"Microsoft.ContainerService/managedClusters/coordination.k8s.io/leases/read",
"Microsoft.ContainerService/managedClusters/coordination.k8s.io/leases/write",
"Microsoft.ContainerService/managedClusters/coordination.k8s.io/leases/delete",
"Microsoft.ContainerService/managedClusters/discovery.k8s.io/endpointslices/read",
"Microsoft.ContainerService/managedClusters/batch/jobs/*",
"Microsoft.ContainerService/managedClusters/configmaps/*",
"Microsoft.ContainerService/managedClusters/endpoints/*",
"Microsoft.ContainerService/managedClusters/events.k8s.io/events/read",
"Microsoft.ContainerService/managedClusters/events/*",
"Microsoft.ContainerService/managedClusters/extensions/daemonsets/*",
"Microsoft.ContainerService/managedClusters/extensions/deployments/*",
"Microsoft.ContainerService/managedClusters/extensions/ingresses/*",
"Microsoft.ContainerService/managedClusters/extensions/networkpolicies/*",
"Microsoft.ContainerService/managedClusters/extensions/replicasets/*",
"Microsoft.ContainerService/managedClusters/limitranges/read",
"Microsoft.ContainerService/managedClusters/metrics.k8s.io/pods/read",
"Microsoft.ContainerService/managedClusters/metrics.k8s.io/nodes/read",
"Microsoft.ContainerService/managedClusters/namespaces/read",
"Microsoft.ContainerService/managedClusters/networking.k8s.io/ingresses/*",
"Microsoft.ContainerService/managedClusters/networking.k8s.io/networkpolicies/*",
"Microsoft.ContainerService/managedClusters/persistentvolumeclaims/*",
"Microsoft.ContainerService/managedClusters/pods/*",
"Microsoft.ContainerService/managedClusters/policy/poddisruptionbudgets/*",
"Microsoft.ContainerService/managedClusters/replicationcontrollers/*",
"Microsoft.ContainerService/managedClusters/resourcequotas/read",
"Microsoft.ContainerService/managedClusters/secrets/*",
"Microsoft.ContainerService/managedClusters/serviceaccounts/*",
"Microsoft.ContainerService/managedClusters/services/*"
],
"notDataActions": []
}
],
"roleName": "Azure Kubernetes Service RBAC Writer",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Kubernetes 에이전트 없는 운영자
Azure Kubernetes Services에 대한 클라우드용 Microsoft Defender 액세스 권한을 부여합니다.
작업 | 설명 |
---|---|
Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/write | 관리형 클러스터에 대한 신뢰할 수 있는 액세스 역할 바인딩 만들기 또는 업데이트 |
Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/read | 관리형 클러스터에 대한 신뢰할 수 있는 액세스 역할 바인딩 가져오기 |
Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/delete | 관리형 클러스터에 대한 신뢰할 수 있는 액세스 역할 바인딩 삭제 |
Microsoft.ContainerService/managedClusters/read | 관리형 클러스터 가져오기 |
Microsoft.Features/features/read | 구독의 기능을 가져옵니다. |
Microsoft.Features/providers/features/read | 지정된 리소스 공급자에서 구독의 기능을 가져옵니다. |
Microsoft.Features/providers/features/register/action | 지정된 리소스 공급자에 구독에 대한 기능을 등록합니다. |
Microsoft.Security/pricings/securityoperators/read | 범위에 대한 보안 연산자를 가져옵니다. |
NotActions | |
없음 | |
DataActions | |
없음 | |
NotDataActions | |
없음 |
{
"assignableScopes": [
"/"
],
"description": "Grants Microsoft Defender for Cloud access to Azure Kubernetes Services",
"id": "/providers/Microsoft.Authorization/roleDefinitions/d5a2ae44-610b-4500-93be-660a0c5f5ca6",
"name": "d5a2ae44-610b-4500-93be-660a0c5f5ca6",
"permissions": [
{
"actions": [
"Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/write",
"Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/read",
"Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/delete",
"Microsoft.ContainerService/managedClusters/read",
"Microsoft.Features/features/read",
"Microsoft.Features/providers/features/read",
"Microsoft.Features/providers/features/register/action",
"Microsoft.Security/pricings/securityoperators/read"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"roleName": "Kubernetes Agentless Operator",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Kubernetes 클러스터 - Azure Arc 온보딩
ConnectedClusters 리소스를 만들기 위해 모든 사용자/서비스에 권한을 부여하는 역할 정의
작업 | 설명 |
---|---|
Microsoft.Authorization/*/read | 역할 및 역할 할당 읽기 |
Microsoft.Insights/alertRules/* | 클래식 메트릭 경고를 만들고 관리합니다. |
Microsoft.Resources/deployments/write | 배포를 만들거나 업데이트합니다. |
Microsoft.Resources/subscriptions/operationresults/read | 구독 작업 결과를 가져옵니다. |
Microsoft.Resources/subscriptions/read | 구독 목록을 가져옵니다. |
Microsoft.Resources/subscriptions/resourceGroups/read | 리소스 그룹을 가져오거나 나열합니다. |
Microsoft.Kubernetes/connectedClusters/Write | connectedClusters를 씁니다. |
Microsoft.Kubernetes/connectedClusters/read | connectedClusters 읽기 |
Microsoft.Support/* | 지원 티켓을 만들거나 업데이트합니다. |
NotActions | |
없음 | |
DataActions | |
없음 | |
NotDataActions | |
없음 |
{
"assignableScopes": [
"/"
],
"description": "Role definition to authorize any user/service to create connectedClusters resource",
"id": "/providers/Microsoft.Authorization/roleDefinitions/34e09817-6cbe-4d01-b1a2-e0eac5743d41",
"name": "34e09817-6cbe-4d01-b1a2-e0eac5743d41",
"permissions": [
{
"actions": [
"Microsoft.Authorization/*/read",
"Microsoft.Insights/alertRules/*",
"Microsoft.Resources/deployments/write",
"Microsoft.Resources/subscriptions/operationresults/read",
"Microsoft.Resources/subscriptions/read",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.Kubernetes/connectedClusters/Write",
"Microsoft.Kubernetes/connectedClusters/read",
"Microsoft.Support/*"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"roleName": "Kubernetes Cluster - Azure Arc Onboarding",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Kubernetes 확장 기여자
Kubernetes 확장을 만들고, 업데이트하고, 가져오고, 나열 및 삭제하고, 확장 비동기 작업을 가져올 수 있습니다.
actions | 설명 |
---|---|
Microsoft.Authorization/*/read | 역할 및 역할 할당 읽기 |
Microsoft.Insights/alertRules/* | 클래식 메트릭 경고를 만들고 관리합니다. |
Microsoft.Resources/deployments/* | 배포를 만들고 관리합니다. |
Microsoft.Resources/subscriptions/resourceGroups/read | 리소스 그룹을 가져오거나 나열합니다. |
Microsoft.KubernetesConfiguration/extensions/write | 확장 리소스를 만들거나 업데이트합니다. |
Microsoft.KubernetesConfiguration/extensions/read | 확장 인스턴스 리소스를 가져옵니다. |
Microsoft.KubernetesConfiguration/extensions/delete | 확장 인스턴스 리소스를 삭제합니다. |
Microsoft.KubernetesConfiguration/extensions/operations/read | 비동기 작업 상태 가져옵니다. |
NotActions | |
없음 | |
DataActions | |
없음 | |
NotDataActions | |
없음 |
{
"assignableScopes": [
"/"
],
"description": "Can create, update, get, list and delete Kubernetes Extensions, and get extension async operations",
"id": "/providers/Microsoft.Authorization/roleDefinitions/85cb6faf-e071-4c9b-8136-154b5a04f717",
"name": "85cb6faf-e071-4c9b-8136-154b5a04f717",
"permissions": [
{
"actions": [
"Microsoft.Authorization/*/read",
"Microsoft.Insights/alertRules/*",
"Microsoft.Resources/deployments/*",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.KubernetesConfiguration/extensions/write",
"Microsoft.KubernetesConfiguration/extensions/read",
"Microsoft.KubernetesConfiguration/extensions/delete",
"Microsoft.KubernetesConfiguration/extensions/operations/read"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
],
"roleName": "Kubernetes Extension Contributor",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}