-
Notifications
You must be signed in to change notification settings - Fork 243
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[General workload issue]: #417
Comments
Hi @Brunoga-MS |
You could also have a MI created in the management subscription but with permission assigned at the pseudoRootMG level like the deployment of AMBA does when not using your own MI. Hence, if using your own MI, no need to create more than one; just assign the necessary permission to the pseudoRootMG. Thanks, |
Thanks, exactly my point, when i run AMBA, i get a MI created by default in the MG Sub, with permissions as monitoring Reader at the pseudo Root or the IR(Intermediate Root), but the remediation fails for any VMs, that are not in the MG Sub. In order to make the remediation work i need to supply and MI residing in the sub locally. |
It shouldn't fail. We need to investigate more on this. I will get back to you as soon as possible |
Many thanks, that was my reason to ask why do I need to create an additional MI |
Hi @Brunoga-MS, |
Hi @vivsri, Hope that helps, |
But we still need to modify the policy definition to use UAMI, as currently it is using SAMI. The one created by AMBA has just monitoring reader permissions, which is not sufficient to make it work for remediation. |
It is since the remediation is done through the SAMI used during the assignment which has all the necessary permission. This is the reason why I tested the assignment through the template. If you cloned the repo, I can share the part of the code to add to the alzArm.json, so you just have to commit and push and then deploy again using your repo. Let me know if you would give it a try. |
I think I'm saying the same thing about the SAMI & was hoping if it can be fixed in the next release or so, after that we can use it as generally available. Also I haven't cloned the repo we are using it directly just keeping the params locally, so i can give it a try using a different tag or feature branch if that makes sense. |
Yes, we have it in our plan. You can try pointing the deployment to use my private template version at https://raw.githubusercontent.com/Brunoga-MS/azure-monitor-baseline-alerts/refs/heads/Assign_VM_To_Identity/patterns/alz/alzArm.json with your param file. As far as the remediation goes, you then have to run the following to remediate both Identity and Connectivity for VM alerts: .\patterns\alz\scripts\Start-AMBARemediation.ps1 -managementGroupName $identityManagementGroup -policyName Alerting-VM Let me know how it goes. |
Thanks I'll give it a try & confirm... |
So the pipeline worked well, using the template version provided by you, it did deploy the initiative at the connectivity scope. Bu the remediation section still has a SAMI instead of using the existing UAMI |
Should not be a problem since the initiative should have been updated by the template. Try to remediate and let me know |
Can i try to run the remediation via the portal directly, actually the remediation worked via the portal, can you pls help me understand the workflow, how it worked with the SAMI |
I would recommend to use the script. Read more at Remediate Policies |
Thanks I'll do so, let's conclude the topic here, hope it will be generally available now to be applied at different scopes. |
It should be soon :-). Given your last comment I am going to close this one as resolved. Feel free to reopen it or to create a new one, should it be the case. Thanks again, |
Check for previous/existing GitHub issues
Issue Type?
Feature Request
Description
Hi Bruno,
Just a quick question around the VM initiative, as it's presently located only at the landing zone scope.
I tested it out by duplicating the assignment to the management sub & it works like a charm.
On the other hand if i try the same trick to other subscription, the remediation fails as it complains the System Assigned ID has no permission over the managed identity, which lives in the management sub, which is not a problem if the vm belongs in a management sub, so i created another MI in the other sub where my vm lives now & the remediation works.
Is this something okay to do, as I'm not sure about the policy definitions & logic, & can we pls have the initiative available at all possible levels including identity where im running an entra connect vm.
The text was updated successfully, but these errors were encountered: