The Azure validator plugin ensures that your Azure environment matches a user-configurable expected state.
The Azure validator plugin reconciles AzureValidator
custom resources to perform the following validations against your Azure environment:
- Compare the Azure RBAC permissions associated with a security principal against an expected permission set.
- Verify that images in community image galleries exist.
Each AzureValidator
CR is (re)-processed every two minutes to continuously ensure that your Azure environment matches the expected state.
See the samples directory for example AzureValidator
configurations. Some samples require you to add data to the rules configured in them such as the Azure subscription to use.
This rule compares the Azure RBAC permissions associated with a security principal against an expected permission set.
It checks if an Azure security principal (e.g., users, service principals) has the required Azure RBAC permissions. In Azure RBAC, permissions are applied to principals by a role assignment being created that links a role (which can be a BuiltInRole or a CustomRole) to the principal at a particular scope. API operations at that scope or lower (e.g. operations against a subscription or against a resource group within the subscription) are permitted but operations outside of that scope are not.
Validation is successful if the principal has the necessary permissions, either from one role assignment or a combination of role assignments.
The list of permissions defined in the spec cannot have an action or data action with a wildcard. However, the roles that provide the permissions (via role assignments) may have wildcards in their actions and data actions.
Note that you must use the correct ID when configuring the principalId
in the spec for the principal. For a service principal, this is the "application object ID" found in the Azure portal under Entra ID > application registration > managed application page > "object ID". Note that this is different from the tenant ID, client ID, and object ID of the application registration.
Service principal example:
See azurevalidator-rbac-one-permission-set-all-actions-permitted-by-one-role.yaml for an example rule spec.
This rule verifies that images in community image galleries exist.
See azurevalidator-communitygalleryimages-one-image.yaml for an example rule spec.
This rule verifies that quota limits are set to a high enough level that current usage plus a buffer you configure isn't higher than the quota. This helps you ensure quotas stay high enough for your expected usage.
See azurevalidator-quota-one-resource-set-one-resource.yaml for an example rule spec.
This is powered by Azure's Quota Service API. The API uses scope and resource name to specify the quota limit or and usage. Scopes include the resource provider of the quota limit or usage. Each resource provider supports certain resource names. Putting this all together, this means an example of a correct scope for the availabilitySets
resource is: subscriptions/{subscriptionId}/providers/Microsoft.Compute/locations/{azure location}
. Azure's website has more detailed examples of which resource providers are available and which scopes are valid for them.
At time of writing, the website does not contain a complete list of which resources are available for each resource provider. To determine this, you must make your own Quota - List API call to each resource provider to get a list of which quota limits exist in your account. Each quota limit will contain a resource name you can use when defining quota rules. See Quotas_listQuotaLimitsForCompute for an example request and response on Azure's website for this endpoint.
Example quota limit from this API call:
{
"id": "/subscriptions/{subscriptionId}/providers/Microsoft.Compute/locations/westus/providers/Microsoft.Quota/quotas/availabilitySets",
"name": "availabilitySets",
"properties": {
"isQuotaApplicable": false,
"limit": {
"limitObjectType": "LimitValue",
"limitType": "Independent",
"value": 2500
},
"name": {
"localizedValue": "Availability Sets",
"value": "availabilitySets"
},
"properties": {},
"unit": "Count"
},
"type": "Microsoft.Quota/Quotas"
},
The resource name is availabilitySets
and the scope is /subscriptions/{subscriptionId}/providers/Microsoft.Compute/locations/westus
. You would use these values when defining a quota rule.
Authentication details for the Azure validator controller are provided within each AzureValidator
custom resource. Azure authentication includes the following env vars:
AZURE_TENANT_ID
- Controls which Entra ID tenant is used.AZURE_CLIENT_ID
- Controls which client/service principal is used.AZURE_CLIENT_SECRET
- The secret for that client.AZURE_ENVIRONMENT
- The Azure environment to connect to (e.g. public cloud vs. Azure Government).
Azure authentication can be configured either implicitly or explicitly:
- Implicit (
AzureValidator.auth.implicit == true
)- Workload identity
- In this scenario, a valid ServiceAccount must be specified during plugin installation. See values.yaml for details.
- Workload identity
- Explicit - Kubernetes Secret (
AzureValidator.auth.implicit == false && AzureValidator.auth.secretName != ""
) - Explicit - Inline (
AzureValidator.auth.implicit == false && AzureValidator.auth.credentials != {}
)- Environment variables
- This allows the plugin to directly execute the validation rules, outside of a Kubernetes environment, using validatorctl. See Commands - check for more info.
Note
See values.yaml for additional configuration details for each authentication option.
For validation to succeed, certain Azure RBAC permissions must be assigned to the principal used via role assignments. The minimal required operations that must be listed under Actions
in the role assignments, by rule, are as follows.
We recommend creating custom roles with the permissions noted here and assigning them instead of assigning built-in roles, but built-in roles that can be used too are listed here under each rule type.
Create a custom role with the following permissions:
- Microsoft.Authorization/denyAssignments/read
- Microsoft.Authorization/roleAssignments/read
- Microsoft.Authorization/roleDefinitions/read
Alternative built-in role: Managed Identity Operator
Create a custom role with the permission Microsoft.Compute/locations/communityGalleries/images/read
.
Alternative built-in role: Virtual Machine Contributor
Create a custom role with the following permissions:
- Microsoft.Quota/quotas/read
- Microsoft.Quota/usages/read
Alternative built-in role: Quota Request Operator
By default, the plugin connects to the public Azure cloud. To change which Azure environment is connected to, specify the environment in the auth config using a Kubernetes secret name or by specifying the config inline.
azureEnvironment value |
Cloud |
---|---|
AzureCloud | public Azure cloud |
AzureUSGovernment | Azure Government |
AzureChinaCloud | Azure in China |
The Azure validator plugin is meant to be installed by validator (via a ValidatorConfig), but it can also be installed directly as follows:
helm repo add validator-plugin-azure https://validator-labs.github.io/validator-plugin-azure
helm repo update
helm install validator-plugin-azure validator-plugin-azure/validator-plugin-azure -n validator-plugin-azure --create-namespace
You’ll need a Kubernetes cluster to run against. You can use kind to get a local cluster for testing, or run against a remote cluster.
Note: Your controller will automatically use the current context in your kubeconfig file (i.e. whatever cluster kubectl cluster-info
shows).
- Install Instances of Custom Resources:
kubectl apply -f config/samples/
- Build and push your image to the location specified by
IMG
:
make docker-build docker-push IMG=<some-registry>/validator-plugin-azure:tag
- Deploy the controller to the cluster with the image specified by
IMG
:
make deploy IMG=<some-registry>/validator-plugin-azure:tag
To delete the CRDs from the cluster:
make uninstall
UnDeploy the controller from the cluster:
make undeploy
This project aims to follow the Kubernetes Operator pattern.
It uses Controllers, which provide a reconcile function responsible for synchronizing resources until the desired state is reached on the cluster.
- Install the CRDs into the cluster:
make install
- Run your controller (this will run in the foreground, so switch to a new terminal if you want to leave it running):
make run
NOTE: You can also run this in one step by running: make install run
If you are editing the API definitions, generate the manifests such as CRs or CRDs using:
make manifests
All contributions are welcome! Feel free to reach out on the Spectro Cloud community Slack.
Make sure pre-commit
is installed.
Install the pre-commit
scripts:
pre-commit install --hook-type commit-msg
pre-commit install --hook-type pre-commit
NOTE: Run make --help
for more information on all potential make
targets
More information can be found via the Kubebuilder Documentation
Copyright 2024.
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.