azure aks preventing external resource modifications by enforcing resource group lockdown
Azure AKS can now prevent unwannted resource modification externally via azure portal that may cause issue later for the cluster, especially when we need to maintain the cluster.
We can do this by registering this component here
az feature register --namespace "Microsoft.ContainerService" --name "NRGLockdownPreview"
To check if this feature is already enabled, run the following command
az feature show --namespace "Microsoft.ContainerService" --name "NRGLockdownPreview"
Then update the cluster to enable lockdown
az aks update --name $CLUSTER_NAME --resource-group $RESOURCE_GROUP_NAME --nrg-lockdown-restriction-level ReadOnly
And you can also remove those lockdown if you wanted to.
So what type of resources are we talking about here?
And now, lets try an delete the public IP for my cluster and see what happens. So I get the folloing error here below:-
The access is denied because of the deny assignment with name 'kubernetes.azure.com: node resource group deny assignment created by Azure Kubernetes Services for nrg-lockdown, see: https://aka.ms/aks/nrg_lockdown'
Can I delete the cluster by removing the entire resource group?
Yes you can do that.
Comments