Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Policy]: Configure Azure Arc enabled Kubernetes clusters to install extensions #1681

Open
1 task done
ReneRebsdorf opened this issue Jun 17, 2024 · 3 comments
Open
1 task done
Assignees
Labels
policy Status: Long Term ⌛ We will do it, but will take a longer amount of time due to complexity/priorities Type: Feature Request ➕ New feature or request

Comments

@ReneRebsdorf
Copy link

Policy Definition or Initiative

Initiative

Built-in/Custom

Custom

Built-in policy definition or initiative ID

ALZInit-Deploy-Arc-Extensions

Custom policy definition or initiative description

Deploy extensions to Azure Arc enabled Kubernetes clusters

Policies in initiative:

  • Configure Azure Arc enabled Kubernetes clusters to install Microsoft Defender for Cloud extension (708b60a6-d253-4fe0-9114-4be4c00f012c)
  • Configure Azure Arc enabled Kubernetes clusters to install the Azure Policy extension (0adc5395-9169-4b9b-8687-af838d69410a)

Scope

Landing Zones

Default Assignment

  • Yes

Comments/thoughts

No response

@Springstone Springstone added Status: Long Term ⌛ We will do it, but will take a longer amount of time due to complexity/priorities Type: Feature Request ➕ New feature or request labels Jun 26, 2024
@Springstone
Copy link
Member

@ReneRebsdorf Thanks for sharing your issue. It is a reasonable request, but can be complex to implement in complex environments, which is why we are not currently deploying by default.

Will investigate adding an option to configure additional "Arc" related settings in future release streams.

@ReneRebsdorf
Copy link
Author

As with most governance items in Azure; these topics can be hard to know whether they are configured correctly from a governance perspective

Which I personally find to be the primary value of CAF; know how to have a good compliance, and omitting Arc is a significant "oversight", purposefully or not.
If it is not desired as a default, I would at least recommend highlighting it, either through exemptions or other means

My 2 cents 😊

@Springstone
Copy link
Member

@ReneRebsdorf you're not wrong, it is potentially complex to govern Arc-enabled resources (agents, etc). We're proposing a new section, that is all about enabling on-prem Arc-enabled features.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
policy Status: Long Term ⌛ We will do it, but will take a longer amount of time due to complexity/priorities Type: Feature Request ➕ New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants