azure aks preventing external resource modifications by enforcing resource group lockdown

Azure AKS can now prevent unwannted resource modification externally via azure portal that may cause issue later for the cluster, especially when we need to maintain the cluster. 

We can do this by registering this component here

az feature register --namespace "Microsoft.ContainerService" --name "NRGLockdownPreview"

To check if this feature is already enabled, run the following command

az feature show --namespace "Microsoft.ContainerService" --name "NRGLockdownPreview"

Then update the cluster to enable lockdown

az aks update --name $CLUSTER_NAME --resource-group $RESOURCE_GROUP_NAME --nrg-lockdown-restriction-level ReadOnly 

And you can also remove those lockdown if you wanted to. 

So what type of resources are we talking about here? 

And now, lets try an delete the public IP for my cluster and see what happens. So I get the folloing error here below:-

The access is denied because of the deny assignment with name 'kubernetes.azure.com: node resource group deny assignment created by Azure Kubernetes Services for nrg-lockdown, see: https://aka.ms/aks/nrg_lockdown'

Can I delete the cluster by removing the entire resource group? 

Yes you can do that. 


Comments

Popular posts from this blog

gemini cli getting file not defined error

NodeJS: Error: spawn EINVAL in window for node version 20.20 and 18.20

vllm : Failed to infer device type