Funções internas do Azure para contêineres

Este artigo lista as funções internas do Azure na categoria Contêineres.

AcrDelete

Exclua repositórios, tags ou manifestos de um registro de contêiner.

Mais informações

Ações Description
Microsoft.ContainerRegistry/registries/artifacts/delete Exclua o artefato em um registro de contêiner.
NotActions
nenhum
DataActions
nenhum
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "acr delete",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/c2f4ef07-c644-48eb-af81-4b1b4947fb11",
  "name": "c2f4ef07-c644-48eb-af81-4b1b4947fb11",
  "permissions": [
    {
      "actions": [
        "Microsoft.ContainerRegistry/registries/artifacts/delete"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "AcrDelete",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

AcrImageSigner

Envie imagens confiáveis ou extraia imagens confiáveis de um registro de contêiner habilitado para confiança de conteúdo.

Mais informações

Ações Description
Microsoft.ContainerRegistry/registries/sign/write Push/Pull content trust metadados para um registro de contêiner.
NotActions
nenhum
DataActions
Microsoft.ContainerRegistry/registries/trustedCollections/write Permite enviar por push ou publicar coleções confiáveis de conteúdo do registro de contêiner. Isso é semelhante à ação Microsoft.ContainerRegistry/registries/sign/write, exceto que esta é uma ação de dados
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "acr image signer",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/6cef56e8-d556-48e5-a04f-b8e64114680f",
  "name": "6cef56e8-d556-48e5-a04f-b8e64114680f",
  "permissions": [
    {
      "actions": [
        "Microsoft.ContainerRegistry/registries/sign/write"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.ContainerRegistry/registries/trustedCollections/write"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "AcrImageSigner",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

AcrPull

Extraia artefatos de um registro de contêiner.

Mais informações

Ações Description
Microsoft.ContainerRegistry/registries/pull/read Puxe ou obtenha imagens de um registro de contêiner.
NotActions
nenhum
DataActions
nenhum
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "acr pull",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/7f951dda-4ed3-4680-a7ca-43fe172d538d",
  "name": "7f951dda-4ed3-4680-a7ca-43fe172d538d",
  "permissions": [
    {
      "actions": [
        "Microsoft.ContainerRegistry/registries/pull/read"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "AcrPull",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

AcrPush

Envie ou extraia artefatos de um registro de contêiner.

Mais informações

Ações Description
Microsoft.ContainerRegistry/registries/pull/read Puxe ou obtenha imagens de um registro de contêiner.
Microsoft.ContainerRegistry/registries/push/write Envie ou grave imagens em um registro de contêiner.
NotActions
nenhum
DataActions
nenhum
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "acr push",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/8311e382-0749-4cb8-b61a-304f252e45ec",
  "name": "8311e382-0749-4cb8-b61a-304f252e45ec",
  "permissions": [
    {
      "actions": [
        "Microsoft.ContainerRegistry/registries/pull/read",
        "Microsoft.ContainerRegistry/registries/push/write"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "AcrPush",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

AcrQuarantineReader

Extraia imagens em quarentena de um registro de contêiner.

Mais informações

Ações Description
Microsoft.ContainerRegistry/registries/quarentena/read Extrair ou obter imagens em quarentena do registro de contêiner
NotActions
nenhum
DataActions
Microsoft.ContainerRegistry/registries/quarantinedArtifacts/read Permite extrair ou obter dos artefatos em quarentena do registro de contêiner. Isso é semelhante a Microsoft.ContainerRegistry/registries/quarantine/read, exceto que é uma ação de dados
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "acr quarantine data reader",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/cdda3590-29a3-44f6-95f2-9f980659eb04",
  "name": "cdda3590-29a3-44f6-95f2-9f980659eb04",
  "permissions": [
    {
      "actions": [
        "Microsoft.ContainerRegistry/registries/quarantine/read"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.ContainerRegistry/registries/quarantinedArtifacts/read"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "AcrQuarantineReader",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

AcrQuarantineWriter

Envie imagens em quarentena ou extraia imagens em quarentena de um registro de contêiner.

Mais informações

Ações Description
Microsoft.ContainerRegistry/registries/quarentena/read Extrair ou obter imagens em quarentena do registro de contêiner
Microsoft.ContainerRegistry/registros/quarentena/gravação Gravar/modificar o estado de quarentena de imagens em quarentena
NotActions
nenhum
DataActions
Microsoft.ContainerRegistry/registries/quarantinedArtifacts/read Permite extrair ou obter dos artefatos em quarentena do registro de contêiner. Isso é semelhante a Microsoft.ContainerRegistry/registries/quarantine/read, exceto que é uma ação de dados
Microsoft.ContainerRegistry/registries/quarantinedArtifacts/write Permite gravar ou atualizar o estado de quarentena de artefatos em quarentena. Isso é semelhante à ação Microsoft.ContainerRegistry/registries/quarantine/write, exceto que é uma ação de dados
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "acr quarantine data writer",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/c8d4ff99-41c3-41a8-9f60-21dfdad59608",
  "name": "c8d4ff99-41c3-41a8-9f60-21dfdad59608",
  "permissions": [
    {
      "actions": [
        "Microsoft.ContainerRegistry/registries/quarantine/read",
        "Microsoft.ContainerRegistry/registries/quarantine/write"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.ContainerRegistry/registries/quarantinedArtifacts/read",
        "Microsoft.ContainerRegistry/registries/quarantinedArtifacts/write"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "AcrQuarantineWriter",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Função de Usuário do Cluster Kubernetes Habilitado para Azure Arc

Ação Listar credenciais de usuário do cluster.

Ações Description
Microsoft.Resources/deployments/write Cria ou atualiza uma implantação.
Microsoft.Resources/subscriptions/operationresults/read Obtenha os resultados da operação de subscrição.
Microsoft.Recursos/subscrições/leitura Obtém a lista de assinaturas.
Microsoft.Resources/subscriptions/resourceGroups/read Obtém ou lista grupos de recursos.
Microsoft.Kubernetes/connectedClusters/listClusterUserCredentials/action Listar clusterCredencial de usuário(visualização)
Microsoft.Authorization/*/read Ler funções e atribuições de funções
Microsoft.Insights/alertRules/* Criar e gerenciar um alerta de métrica clássica
Microsoft.Suporte/* Criar e atualizar um ticket de suporte
Microsoft.Kubernetes/connectedClusters/listClusterUserCredential/action Listar clusterCredencial de usuário
NotActions
nenhum
DataActions
nenhum
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "List cluster user credentials action.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/00493d72-78f6-4148-b6c5-d3ce8e4799dd",
  "name": "00493d72-78f6-4148-b6c5-d3ce8e4799dd",
  "permissions": [
    {
      "actions": [
        "Microsoft.Resources/deployments/write",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.Kubernetes/connectedClusters/listClusterUserCredentials/action",
        "Microsoft.Authorization/*/read",
        "Microsoft.Insights/alertRules/*",
        "Microsoft.Support/*",
        "Microsoft.Kubernetes/connectedClusters/listClusterUserCredential/action"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Arc Enabled Kubernetes Cluster User Role",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Arc Kubernetes Admin

Permite gerenciar todos os recursos em cluster/namespace, exceto atualizar ou excluir cotas de recursos e namespaces.

Mais informações

Ações Descrição
Microsoft.Authorization/*/read Ler funções e atribuições de funções
Microsoft.Insights/alertRules/* Criar e gerenciar um alerta de métrica clássica
Microsoft.Resources/deployments/write Cria ou atualiza uma implantação.
Microsoft.Resources/subscriptions/operationresults/read Obtenha os resultados da operação de subscrição.
Microsoft.Recursos/subscrições/leitura Obtém a lista de assinaturas.
Microsoft.Resources/subscriptions/resourceGroups/read Obtém ou lista grupos de recursos.
Microsoft.Suporte/* Criar e atualizar um ticket de suporte
NotActions
nenhum
DataActions
Microsoft.Kubernetes/connectedClusters/apps/controllerrevisions/read Lê revisões do controlador
Microsoft.Kubernetes/connectedClusters/apps/daemonsets/*
Microsoft.Kubernetes/connectedClusters/apps/deployments/*
Microsoft.Kubernetes/connectedClusters/apps/replicasets/*
Microsoft.Kubernetes/connectedClusters/apps/statefulsets/*
Microsoft.Kubernetes/connectedClusters/authorization.k8s.io/localsubjectaccessreviews/write Escreve localsubjectaccessreviews
Microsoft.Kubernetes/connectedClusters/autoscaling/horizontalpodautoscalers/*
Microsoft.Kubernetes/connectedClusters/batch/cronjobs/*
Microsoft.Kubernetes/connectedClusters/batch/jobs/*
Microsoft.Kubernetes/connectedClusters/configmaps/*
Microsoft.Kubernetes/connectedClusters/endpoints/*
Microsoft.Kubernetes/connectedClusters/events.k8s.io/events/read Lê eventos
Microsoft.Kubernetes/connectedClusters/events/read Lê eventos
Microsoft.Kubernetes/connectedClusters/extensions/daemonsets/*
Microsoft.Kubernetes/connectedClusters/extensions/deployments/*
Microsoft.Kubernetes/connectedClusters/extensions/ingresses/*
Microsoft.Kubernetes/connectedClusters/extensions/networkpolicies/*
Microsoft.Kubernetes/connectedClusters/extensions/replicasets/*
Microsoft.Kubernetes/connectedClusters/limitranges/read Intervalos de limites de leitura
Microsoft.Kubernetes/connectedClusters/namespaces/read Lê namespaces
Microsoft.Kubernetes/connectedClusters/networking.k8s.io/ingresses/*
Microsoft.Kubernetes/connectedClusters/networking.k8s.io/networkpolicies/*
Microsoft.Kubernetes/connectedClusters/persistentvolumeclaims/*
Microsoft.Kubernetes/connectedClusters/pods/*
Microsoft.Kubernetes/connectedClusters/policy/poddisruptionbudgets/*
Microsoft.Kubernetes/connectedClusters/rbac.authorization.k8s.io/rolebindings/*
Microsoft.Kubernetes/connectedClusters/rbac.authorization.k8s.io/roles/*
Microsoft.Kubernetes/connectedClusters/replicationcontrollers/*
Microsoft.Kubernetes/connectedClusters/replicationcontrollers/*
Microsoft.Kubernetes/connectedClusters/resourcequotas/read Lê cotas de recursos
Microsoft.Kubernetes/connectedClusters/secrets/*
Microsoft.Kubernetes/connectedClusters/serviceaccounts/*
Microsoft.Kubernetes/connectedClusters/services/*
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "Lets you manage all resources under cluster/namespace, except update or delete resource quotas and namespaces.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/dffb1e0c-446f-4dde-a09f-99eb5cc68b96",
  "name": "dffb1e0c-446f-4dde-a09f-99eb5cc68b96",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Insights/alertRules/*",
        "Microsoft.Resources/deployments/write",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.Support/*"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.Kubernetes/connectedClusters/apps/controllerrevisions/read",
        "Microsoft.Kubernetes/connectedClusters/apps/daemonsets/*",
        "Microsoft.Kubernetes/connectedClusters/apps/deployments/*",
        "Microsoft.Kubernetes/connectedClusters/apps/replicasets/*",
        "Microsoft.Kubernetes/connectedClusters/apps/statefulsets/*",
        "Microsoft.Kubernetes/connectedClusters/authorization.k8s.io/localsubjectaccessreviews/write",
        "Microsoft.Kubernetes/connectedClusters/autoscaling/horizontalpodautoscalers/*",
        "Microsoft.Kubernetes/connectedClusters/batch/cronjobs/*",
        "Microsoft.Kubernetes/connectedClusters/batch/jobs/*",
        "Microsoft.Kubernetes/connectedClusters/configmaps/*",
        "Microsoft.Kubernetes/connectedClusters/endpoints/*",
        "Microsoft.Kubernetes/connectedClusters/events.k8s.io/events/read",
        "Microsoft.Kubernetes/connectedClusters/events/read",
        "Microsoft.Kubernetes/connectedClusters/extensions/daemonsets/*",
        "Microsoft.Kubernetes/connectedClusters/extensions/deployments/*",
        "Microsoft.Kubernetes/connectedClusters/extensions/ingresses/*",
        "Microsoft.Kubernetes/connectedClusters/extensions/networkpolicies/*",
        "Microsoft.Kubernetes/connectedClusters/extensions/replicasets/*",
        "Microsoft.Kubernetes/connectedClusters/limitranges/read",
        "Microsoft.Kubernetes/connectedClusters/namespaces/read",
        "Microsoft.Kubernetes/connectedClusters/networking.k8s.io/ingresses/*",
        "Microsoft.Kubernetes/connectedClusters/networking.k8s.io/networkpolicies/*",
        "Microsoft.Kubernetes/connectedClusters/persistentvolumeclaims/*",
        "Microsoft.Kubernetes/connectedClusters/pods/*",
        "Microsoft.Kubernetes/connectedClusters/policy/poddisruptionbudgets/*",
        "Microsoft.Kubernetes/connectedClusters/rbac.authorization.k8s.io/rolebindings/*",
        "Microsoft.Kubernetes/connectedClusters/rbac.authorization.k8s.io/roles/*",
        "Microsoft.Kubernetes/connectedClusters/replicationcontrollers/*",
        "Microsoft.Kubernetes/connectedClusters/replicationcontrollers/*",
        "Microsoft.Kubernetes/connectedClusters/resourcequotas/read",
        "Microsoft.Kubernetes/connectedClusters/secrets/*",
        "Microsoft.Kubernetes/connectedClusters/serviceaccounts/*",
        "Microsoft.Kubernetes/connectedClusters/services/*"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Arc Kubernetes Admin",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Arc Kubernetes Cluster Admin

Permite gerenciar todos os recursos no cluster.

Mais informações

Ações Descrição
Microsoft.Authorization/*/read Ler funções e atribuições de funções
Microsoft.Insights/alertRules/* Criar e gerenciar um alerta de métrica clássica
Microsoft.Resources/deployments/write Cria ou atualiza uma implantação.
Microsoft.Resources/subscriptions/operationresults/read Obtenha os resultados da operação de subscrição.
Microsoft.Recursos/subscrições/leitura Obtém a lista de assinaturas.
Microsoft.Resources/subscriptions/resourceGroups/read Obtém ou lista grupos de recursos.
Microsoft.Suporte/* Criar e atualizar um ticket de suporte
NotActions
nenhum
DataActions
Microsoft.Kubernetes/connectedClusters/*
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "Lets you manage all resources in the cluster.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/8393591c-06b9-48a2-a542-1bd6b377f6a2",
  "name": "8393591c-06b9-48a2-a542-1bd6b377f6a2",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Insights/alertRules/*",
        "Microsoft.Resources/deployments/write",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.Support/*"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.Kubernetes/connectedClusters/*"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Arc Kubernetes Cluster Admin",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Arc Kubernetes Viewer

Permite visualizar todos os recursos em cluster/namespace, exceto segredos.

Mais informações

Ações Descrição
Microsoft.Authorization/*/read Ler funções e atribuições de funções
Microsoft.Insights/alertRules/* Criar e gerenciar um alerta de métrica clássica
Microsoft.Resources/deployments/write Cria ou atualiza uma implantação.
Microsoft.Resources/subscriptions/operationresults/read Obtenha os resultados da operação de subscrição.
Microsoft.Recursos/subscrições/leitura Obtém a lista de assinaturas.
Microsoft.Resources/subscriptions/resourceGroups/read Obtém ou lista grupos de recursos.
Microsoft.Suporte/* Criar e atualizar um ticket de suporte
NotActions
nenhum
DataActions
Microsoft.Kubernetes/connectedClusters/apps/controllerrevisions/read Lê revisões do controlador
Microsoft.Kubernetes/connectedClusters/apps/daemonsets/read Lê daemonsets
Microsoft.Kubernetes/connectedClusters/apps/deployments/read Lê implantações
Microsoft.Kubernetes/connectedClusters/apps/replicasets/read Lê conjuntos de réplicas
Microsoft.Kubernetes/connectedClusters/apps/statefulsets/read Lê statefulsets
Microsoft.Kubernetes/connectedClusters/autoscaling/horizontalpodautoscalers/read Lê horizontalpodautoscalers
Microsoft.Kubernetes/connectedClusters/batch/cronjobs/read Lê cronjobs
Microsoft.Kubernetes/connectedClusters/batch/jobs/read Lê trabalhos
Microsoft.Kubernetes/connectedClusters/configmaps/read Lê configmaps
Microsoft.Kubernetes/connectedClusters/endpoints/read Lê pontos de extremidade
Microsoft.Kubernetes/connectedClusters/events.k8s.io/events/read Lê eventos
Microsoft.Kubernetes/connectedClusters/events/read Lê eventos
Microsoft.Kubernetes/connectedClusters/extensions/daemonsets/read Lê daemonsets
Microsoft.Kubernetes/connectedClusters/extensions/deployments/read Lê implantações
Microsoft.Kubernetes/connectedClusters/extensions/ingresses/read Lê ingressos
Microsoft.Kubernetes/connectedClusters/extensions/networkpolicies/read Lê políticas de rede
Microsoft.Kubernetes/connectedClusters/extensions/replicasets/read Lê conjuntos de réplicas
Microsoft.Kubernetes/connectedClusters/limitranges/read Intervalos de limites de leitura
Microsoft.Kubernetes/connectedClusters/namespaces/read Lê namespaces
Microsoft.Kubernetes/connectedClusters/networking.k8s.io/ingresses/read Lê ingressos
Microsoft.Kubernetes/connectedClusters/networking.k8s.io/networkpolicies/read Lê políticas de rede
Microsoft.Kubernetes/connectedClusters/persistentvolumeclaims/read Lê declarações de volume persistentes
Microsoft.Kubernetes/connectedClusters/pods/read Lê pods
Microsoft.Kubernetes/connectedClusters/policy/poddisruptionbudgets/read Lê poddisruptionbudgets
Microsoft.Kubernetes/connectedClusters/replicationcontrollers/read Lê controladores de replicação
Microsoft.Kubernetes/connectedClusters/replicationcontrollers/read Lê controladores de replicação
Microsoft.Kubernetes/connectedClusters/resourcequotas/read Lê cotas de recursos
Microsoft.Kubernetes/connectedClusters/serviceaccounts/read Lê contas de serviço
Microsoft.Kubernetes/connectedClusters/services/read Serviços de leitura
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "Lets you view all resources in cluster/namespace, except secrets.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/63f0a09d-1495-4db4-a681-037d84835eb4",
  "name": "63f0a09d-1495-4db4-a681-037d84835eb4",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Insights/alertRules/*",
        "Microsoft.Resources/deployments/write",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.Support/*"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.Kubernetes/connectedClusters/apps/controllerrevisions/read",
        "Microsoft.Kubernetes/connectedClusters/apps/daemonsets/read",
        "Microsoft.Kubernetes/connectedClusters/apps/deployments/read",
        "Microsoft.Kubernetes/connectedClusters/apps/replicasets/read",
        "Microsoft.Kubernetes/connectedClusters/apps/statefulsets/read",
        "Microsoft.Kubernetes/connectedClusters/autoscaling/horizontalpodautoscalers/read",
        "Microsoft.Kubernetes/connectedClusters/batch/cronjobs/read",
        "Microsoft.Kubernetes/connectedClusters/batch/jobs/read",
        "Microsoft.Kubernetes/connectedClusters/configmaps/read",
        "Microsoft.Kubernetes/connectedClusters/endpoints/read",
        "Microsoft.Kubernetes/connectedClusters/events.k8s.io/events/read",
        "Microsoft.Kubernetes/connectedClusters/events/read",
        "Microsoft.Kubernetes/connectedClusters/extensions/daemonsets/read",
        "Microsoft.Kubernetes/connectedClusters/extensions/deployments/read",
        "Microsoft.Kubernetes/connectedClusters/extensions/ingresses/read",
        "Microsoft.Kubernetes/connectedClusters/extensions/networkpolicies/read",
        "Microsoft.Kubernetes/connectedClusters/extensions/replicasets/read",
        "Microsoft.Kubernetes/connectedClusters/limitranges/read",
        "Microsoft.Kubernetes/connectedClusters/namespaces/read",
        "Microsoft.Kubernetes/connectedClusters/networking.k8s.io/ingresses/read",
        "Microsoft.Kubernetes/connectedClusters/networking.k8s.io/networkpolicies/read",
        "Microsoft.Kubernetes/connectedClusters/persistentvolumeclaims/read",
        "Microsoft.Kubernetes/connectedClusters/pods/read",
        "Microsoft.Kubernetes/connectedClusters/policy/poddisruptionbudgets/read",
        "Microsoft.Kubernetes/connectedClusters/replicationcontrollers/read",
        "Microsoft.Kubernetes/connectedClusters/replicationcontrollers/read",
        "Microsoft.Kubernetes/connectedClusters/resourcequotas/read",
        "Microsoft.Kubernetes/connectedClusters/serviceaccounts/read",
        "Microsoft.Kubernetes/connectedClusters/services/read"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Arc Kubernetes Viewer",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Arc Kubernetes Writer

Permite atualizar tudo no cluster/namespace, exceto funções (cluster) e ligações de função (cluster).

Mais informações

Ações Descrição
Microsoft.Authorization/*/read Ler funções e atribuições de funções
Microsoft.Insights/alertRules/* Criar e gerenciar um alerta de métrica clássica
Microsoft.Resources/deployments/write Cria ou atualiza uma implantação.
Microsoft.Resources/subscriptions/operationresults/read Obtenha os resultados da operação de subscrição.
Microsoft.Recursos/subscrições/leitura Obtém a lista de assinaturas.
Microsoft.Resources/subscriptions/resourceGroups/read Obtém ou lista grupos de recursos.
Microsoft.Suporte/* Criar e atualizar um ticket de suporte
NotActions
nenhum
DataActions
Microsoft.Kubernetes/connectedClusters/apps/controllerrevisions/read Lê revisões do controlador
Microsoft.Kubernetes/connectedClusters/apps/daemonsets/*
Microsoft.Kubernetes/connectedClusters/apps/deployments/*
Microsoft.Kubernetes/connectedClusters/apps/replicasets/*
Microsoft.Kubernetes/connectedClusters/apps/statefulsets/*
Microsoft.Kubernetes/connectedClusters/autoscaling/horizontalpodautoscalers/*
Microsoft.Kubernetes/connectedClusters/batch/cronjobs/*
Microsoft.Kubernetes/connectedClusters/batch/jobs/*
Microsoft.Kubernetes/connectedClusters/configmaps/*
Microsoft.Kubernetes/connectedClusters/endpoints/*
Microsoft.Kubernetes/connectedClusters/events.k8s.io/events/read Lê eventos
Microsoft.Kubernetes/connectedClusters/events/read Lê eventos
Microsoft.Kubernetes/connectedClusters/extensions/daemonsets/*
Microsoft.Kubernetes/connectedClusters/extensions/deployments/*
Microsoft.Kubernetes/connectedClusters/extensions/ingresses/*
Microsoft.Kubernetes/connectedClusters/extensions/networkpolicies/*
Microsoft.Kubernetes/connectedClusters/extensions/replicasets/*
Microsoft.Kubernetes/connectedClusters/limitranges/read Intervalos de limites de leitura
Microsoft.Kubernetes/connectedClusters/namespaces/read Lê namespaces
Microsoft.Kubernetes/connectedClusters/networking.k8s.io/ingresses/*
Microsoft.Kubernetes/connectedClusters/networking.k8s.io/networkpolicies/*
Microsoft.Kubernetes/connectedClusters/persistentvolumeclaims/*
Microsoft.Kubernetes/connectedClusters/pods/*
Microsoft.Kubernetes/connectedClusters/policy/poddisruptionbudgets/*
Microsoft.Kubernetes/connectedClusters/replicationcontrollers/*
Microsoft.Kubernetes/connectedClusters/replicationcontrollers/*
Microsoft.Kubernetes/connectedClusters/resourcequotas/read Lê cotas de recursos
Microsoft.Kubernetes/connectedClusters/secrets/*
Microsoft.Kubernetes/connectedClusters/serviceaccounts/*
Microsoft.Kubernetes/connectedClusters/services/*
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "Lets you update everything in cluster/namespace, except (cluster)roles and (cluster)role bindings.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/5b999177-9696-4545-85c7-50de3797e5a1",
  "name": "5b999177-9696-4545-85c7-50de3797e5a1",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Insights/alertRules/*",
        "Microsoft.Resources/deployments/write",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.Support/*"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.Kubernetes/connectedClusters/apps/controllerrevisions/read",
        "Microsoft.Kubernetes/connectedClusters/apps/daemonsets/*",
        "Microsoft.Kubernetes/connectedClusters/apps/deployments/*",
        "Microsoft.Kubernetes/connectedClusters/apps/replicasets/*",
        "Microsoft.Kubernetes/connectedClusters/apps/statefulsets/*",
        "Microsoft.Kubernetes/connectedClusters/autoscaling/horizontalpodautoscalers/*",
        "Microsoft.Kubernetes/connectedClusters/batch/cronjobs/*",
        "Microsoft.Kubernetes/connectedClusters/batch/jobs/*",
        "Microsoft.Kubernetes/connectedClusters/configmaps/*",
        "Microsoft.Kubernetes/connectedClusters/endpoints/*",
        "Microsoft.Kubernetes/connectedClusters/events.k8s.io/events/read",
        "Microsoft.Kubernetes/connectedClusters/events/read",
        "Microsoft.Kubernetes/connectedClusters/extensions/daemonsets/*",
        "Microsoft.Kubernetes/connectedClusters/extensions/deployments/*",
        "Microsoft.Kubernetes/connectedClusters/extensions/ingresses/*",
        "Microsoft.Kubernetes/connectedClusters/extensions/networkpolicies/*",
        "Microsoft.Kubernetes/connectedClusters/extensions/replicasets/*",
        "Microsoft.Kubernetes/connectedClusters/limitranges/read",
        "Microsoft.Kubernetes/connectedClusters/namespaces/read",
        "Microsoft.Kubernetes/connectedClusters/networking.k8s.io/ingresses/*",
        "Microsoft.Kubernetes/connectedClusters/networking.k8s.io/networkpolicies/*",
        "Microsoft.Kubernetes/connectedClusters/persistentvolumeclaims/*",
        "Microsoft.Kubernetes/connectedClusters/pods/*",
        "Microsoft.Kubernetes/connectedClusters/policy/poddisruptionbudgets/*",
        "Microsoft.Kubernetes/connectedClusters/replicationcontrollers/*",
        "Microsoft.Kubernetes/connectedClusters/replicationcontrollers/*",
        "Microsoft.Kubernetes/connectedClusters/resourcequotas/read",
        "Microsoft.Kubernetes/connectedClusters/secrets/*",
        "Microsoft.Kubernetes/connectedClusters/serviceaccounts/*",
        "Microsoft.Kubernetes/connectedClusters/services/*"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Arc Kubernetes Writer",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Container Storage Contributor

Instale o Armazenamento de Contêiner do Azure e gerencie seus recursos de armazenamento. Inclui uma condição ABAC para restringir atribuições de função.

Ações Description
Microsoft.KubernetesConfiguração/extensões/gravação Cria ou atualiza o recurso de extensão.
Microsoft.KubernetesConfiguração/extensões/leitura Obtém recurso de instância de extensão.
Microsoft.KubernetesConfiguration/extensions/delete Exclui o recurso de instância de extensão.
Microsoft.KubernetesConfiguration/extensions/operations/read Obtém o status da operação assíncrona.
Microsoft.Authorization/*/read Ler funções e atribuições de funções
Microsoft.Resources/subscriptions/resourceGroups/read Obtém ou lista grupos de recursos.
Microsoft.Recursos/subscrições/leitura Obtém a lista de assinaturas.
Microsoft.Management/managementGroups/read Listar grupos de gerenciamento para o usuário autenticado.
Microsoft.Recursos/implantações/* Criar e gerenciar uma implantação
Microsoft.Suporte/* Criar e atualizar um ticket de suporte
NotActions
nenhum
DataActions
nenhum
NotDataActions
nenhum
Ações
Microsoft.Authorization/roleAssignments/write Crie uma atribuição de função no escopo especificado.
Microsoft.Authorization/roleAssignments/delete Exclua uma atribuição de função no escopo especificado.
NotActions
nenhum
DataActions
nenhum
NotDataActions
nenhum
Condition
((! (ActionMatches{'Microsoft.Authorization/roleAssignments/write'})) OU (@Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals{08d4c71acc634ce4a9c85dd251b4d619})) E ((!( ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})) OU (@Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals{08d4c71acc634ce4a9c85dd251b4d619})) Adicione ou remova atribuições de função para as seguintes funções:
Operador de Armazenamento de Contêiner do Azure
{
  "assignableScopes": [
    "/"
  ],
  "description": "Lets you install Azure Container Storage and manage its storage resources",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/95dd08a6-00bd-4661-84bf-f6726f83a4d0",
  "name": "95dd08a6-00bd-4661-84bf-f6726f83a4d0",
  "permissions": [
    {
      "actions": [
        "Microsoft.KubernetesConfiguration/extensions/write",
        "Microsoft.KubernetesConfiguration/extensions/read",
        "Microsoft.KubernetesConfiguration/extensions/delete",
        "Microsoft.KubernetesConfiguration/extensions/operations/read",
        "Microsoft.Authorization/*/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Management/managementGroups/read",
        "Microsoft.Resources/deployments/*",
        "Microsoft.Support/*"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    },
    {
      "actions": [
        "Microsoft.Authorization/roleAssignments/write",
        "Microsoft.Authorization/roleAssignments/delete"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": [],
      "conditionVersion": "2.0",
      "condition": "((!(ActionMatches{'Microsoft.Authorization/roleAssignments/write'})) OR (@Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals{08d4c71acc634ce4a9c85dd251b4d619})) AND ((!(ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})) OR (@Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals{08d4c71acc634ce4a9c85dd251b4d619}))"
    }
  ],
  "roleName": "Azure Container Storage Contributor",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Operador de Armazenamento de Contêiner do Azure

Habilite uma identidade gerenciada para executar operações de Armazenamento de Contêiner do Azure, como gerenciar máquinas virtuais e gerenciar redes virtuais.

Ações Description
Microsoft.ElasticSan/elasticSans/*
Microsoft.ElasticSan/locations/asyncoperations/read Sonda o status de uma operação assíncrona.
Microsoft.Network/routeTables/join/action Junta-se a uma tabela de rotas. Não alertável.
Microsoft.Network/networkSecurityGroups/join/action Ingressa em um grupo de segurança de rede. Não alertável.
Microsoft.Network/virtualNetworks/gravação Cria uma rede virtual ou atualiza uma rede virtual existente
Microsoft.Network/virtualNetworks/excluir Exclui uma rede virtual
Microsoft.Network/virtualNetworks/join/action Junta-se a uma rede virtual. Não alertável.
Microsoft.Network/virtualNetworks/sub-redes/leitura Obtém uma definição de sub-rede de rede virtual
Microsoft.Network/virtualNetworks/sub-redes/gravação Cria uma sub-rede de rede virtual ou atualiza uma sub-rede de rede virtual existente
Microsoft.Compute/virtualMachines/leitura Obter as propriedades de uma máquina virtual
Microsoft.Compute/virtualMachines/write Cria uma nova máquina virtual ou atualiza uma máquina virtual existente
Microsoft.Compute/virtualMachineScaleSets/read Obter as propriedades de um Conjunto de Dimensionamento de Máquina Virtual
Microsoft.Compute/virtualMachineScaleSets/gravação Cria um novo Conjunto de Dimensionamento de Máquina Virtual ou atualiza um existente
Microsoft.Compute/virtualMachineScaleSets/virtualMachines/write Atualiza as propriedades de uma máquina virtual em um conjunto de escala de VM
Microsoft.Compute/virtualMachineScaleSets/virtualMachines/read Recupera as propriedades de uma máquina virtual em um conjunto de escala de VM
Microsoft.Resources/subscriptions/providers/read Obtém ou lista provedores de recursos.
Microsoft.Resources/subscriptions/resourceGroups/read Obtém ou lista grupos de recursos.
Microsoft.Network/virtualNetworks/ler Obter a definição de rede virtual
NotActions
nenhum
DataActions
nenhum
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "Role required by a Managed Identity for Azure Container Storage operations",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/08d4c71a-cc63-4ce4-a9c8-5dd251b4d619",
  "name": "08d4c71a-cc63-4ce4-a9c8-5dd251b4d619",
  "permissions": [
    {
      "actions": [
        "Microsoft.ElasticSan/elasticSans/*",
        "Microsoft.ElasticSan/locations/asyncoperations/read",
        "Microsoft.Network/routeTables/join/action",
        "Microsoft.Network/networkSecurityGroups/join/action",
        "Microsoft.Network/virtualNetworks/write",
        "Microsoft.Network/virtualNetworks/delete",
        "Microsoft.Network/virtualNetworks/join/action",
        "Microsoft.Network/virtualNetworks/subnets/read",
        "Microsoft.Network/virtualNetworks/subnets/write",
        "Microsoft.Compute/virtualMachines/read",
        "Microsoft.Compute/virtualMachines/write",
        "Microsoft.Compute/virtualMachineScaleSets/read",
        "Microsoft.Compute/virtualMachineScaleSets/write",
        "Microsoft.Compute/virtualMachineScaleSets/virtualMachines/write",
        "Microsoft.Compute/virtualMachineScaleSets/virtualMachines/read",
        "Microsoft.Resources/subscriptions/providers/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.Network/virtualNetworks/read"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Container Storage Operator",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Proprietário do Armazenamento de Contêiner do Azure

Instale o Armazenamento de Contêineres do Azure, conceda acesso aos seus recursos de armazenamento e configure a SAN (rede de área de armazenamento) elástica do Azure. Inclui uma condição ABAC para restringir atribuições de função.

Ações Description
Microsoft.ElasticSan/elasticSans/*
Microsoft.ElasticSan/locations/*
Microsoft.ElasticSan/elasticSans/volumeGroups/*
Microsoft.ElasticSan/elasticSans/volumeGroups/volumes/*
Microsoft.ElasticSan/locations/asyncoperations/read Sonda o status de uma operação assíncrona.
Microsoft.KubernetesConfiguração/extensões/gravação Cria ou atualiza o recurso de extensão.
Microsoft.KubernetesConfiguração/extensões/leitura Obtém recurso de instância de extensão.
Microsoft.KubernetesConfiguration/extensions/delete Exclui o recurso de instância de extensão.
Microsoft.KubernetesConfiguration/extensions/operations/read Obtém o status da operação assíncrona.
Microsoft.Authorization/*/read Ler funções e atribuições de funções
Microsoft.Resources/subscriptions/resourceGroups/read Obtém ou lista grupos de recursos.
Microsoft.Recursos/subscrições/leitura Obtém a lista de assinaturas.
Microsoft.Management/managementGroups/read Listar grupos de gerenciamento para o usuário autenticado.
Microsoft.Recursos/implantações/* Criar e gerenciar uma implantação
Microsoft.Suporte/* Criar e atualizar um ticket de suporte
NotActions
nenhum
DataActions
nenhum
NotDataActions
nenhum
Ações
Microsoft.Authorization/roleAssignments/write Crie uma atribuição de função no escopo especificado.
Microsoft.Authorization/roleAssignments/delete Exclua uma atribuição de função no escopo especificado.
NotActions
nenhum
DataActions
nenhum
NotDataActions
nenhum
Condition
((! (ActionMatches{'Microsoft.Authorization/roleAssignments/write'})) OU (@Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals{08d4c71acc634ce4a9c85dd251b4d619})) E ((!( ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})) OU (@Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals{08d4c71acc634ce4a9c85dd251b4d619})) Adicione ou remova atribuições de função para as seguintes funções:
Operador de Armazenamento de Contêiner do Azure
{
  "assignableScopes": [
    "/"
  ],
  "description": "Lets you install Azure Container Storage and grants access to its storage resources",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/95de85bd-744d-4664-9dde-11430bc34793",
  "name": "95de85bd-744d-4664-9dde-11430bc34793",
  "permissions": [
    {
      "actions": [
        "Microsoft.ElasticSan/elasticSans/*",
        "Microsoft.ElasticSan/locations/*",
        "Microsoft.ElasticSan/elasticSans/volumeGroups/*",
        "Microsoft.ElasticSan/elasticSans/volumeGroups/volumes/*",
        "Microsoft.ElasticSan/locations/asyncoperations/read",
        "Microsoft.KubernetesConfiguration/extensions/write",
        "Microsoft.KubernetesConfiguration/extensions/read",
        "Microsoft.KubernetesConfiguration/extensions/delete",
        "Microsoft.KubernetesConfiguration/extensions/operations/read",
        "Microsoft.Authorization/*/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Management/managementGroups/read",
        "Microsoft.Resources/deployments/*",
        "Microsoft.Support/*"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    },
    {
      "actions": [
        "Microsoft.Authorization/roleAssignments/write",
        "Microsoft.Authorization/roleAssignments/delete"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": [],
      "conditionVersion": "2.0",
      "condition": "((!(ActionMatches{'Microsoft.Authorization/roleAssignments/write'})) OR (@Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals{08d4c71acc634ce4a9c85dd251b4d619})) AND ((!(ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})) OR (@Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals{08d4c71acc634ce4a9c85dd251b4d619}))"
    }
  ],
  "roleName": "Azure Container Storage Owner",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Função de Colaborador do Azure Kubernetes Fleet Manager

Concede acesso de leitura/gravação aos recursos do Azure fornecidos pelo Azure Kubernetes Fleet Manager, incluindo frotas, membros da frota, estratégias de atualização de frota, execuções de atualização de frota, etc.

Ações Description
Microsoft.ContainerService/frotas/*
Microsoft.Recursos/implantações/* Criar e gerenciar uma implantação
NotActions
nenhum
DataActions
nenhum
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "Grants read/write access to Azure resources provided by Azure Kubernetes Fleet Manager, including fleets, fleet members, fleet update strategies, fleet update runs, etc.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/63bb64ad-9799-4770-b5c3-24ed299a07bf",
  "name": "63bb64ad-9799-4770-b5c3-24ed299a07bf",
  "permissions": [
    {
      "actions": [
        "Microsoft.ContainerService/fleets/*",
        "Microsoft.Resources/deployments/*"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Fleet Manager Contributor Role",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Kubernetes Fleet Manager RBAC Admin

Concede acesso de leitura/gravação aos recursos do Kubernetes dentro de um namespace no cluster de hub gerenciado por frota - fornece permissões de gravação na maioria dos objetos dentro de um namespace, com exceção do objeto ResourceQuota e do próprio objeto de namespace. A aplicação dessa função no escopo do cluster dará acesso a todos os namespaces.

Mais informações

Ações Descrição
Microsoft.Authorization/*/read Ler funções e atribuições de funções
Microsoft.Resources/subscriptions/operationresults/read Obtenha os resultados da operação de subscrição.
Microsoft.Recursos/subscrições/leitura Obtém a lista de assinaturas.
Microsoft.Resources/subscriptions/resourceGroups/read Obtém ou lista grupos de recursos.
Microsoft.ContainerService/fleets/read Obter frota
Microsoft.ContainerService/fleets/listCredentials/action Listar credenciais da frota
NotActions
nenhum
DataActions
Microsoft.ContainerService/fleets/apps/controllerrevisions/read Lê revisões do controlador
Microsoft.ContainerService/fleets/apps/daemonsets/*
Microsoft.ContainerService/fleets/apps/deployments/*
Microsoft.ContainerService/fleets/apps/statefulsets/*
Microsoft.ContainerService/fleets/authorization.k8s.io/localsubjectaccessreviews/write Escreve localsubjectaccessreviews
Microsoft.ContainerService/fleets/autoscaling/horizontalpodautoscalers/*
Microsoft.ContainerService/fleets/batch/cronjobs/*
Microsoft.ContainerService/fleets/batch/jobs/*
Microsoft.ContainerService/fleets/configmaps/*
Microsoft.ContainerService/frotas/endpoints/*
Microsoft.ContainerService/fleets/events.k8s.io/events/read Lê eventos
Microsoft.ContainerService/fleets/events/read Lê eventos
Microsoft.ContainerService/fleets/extensions/daemonsets/*
Microsoft.ContainerService/fleets/extensions/deployments/*
Microsoft.ContainerService/fleets/extensions/ingresses/*
Microsoft.ContainerService/fleets/extensions/networkpolicies/*
Microsoft.ContainerService/fleets/limitranges/read Intervalos de limites de leitura
Microsoft.ContainerService/fleets/namespaces/read Lê namespaces
Microsoft.ContainerService/fleets/networking.k8s.io/ingresses/*
Microsoft.ContainerService/fleets/networking.k8s.io/networkpolicies/*
Microsoft.ContainerService/fleets/persistentvolumeclaims/*
Microsoft.ContainerService/fleets/policy/poddisruptionbudgets/*
Microsoft.ContainerService/fleets/rbac.authorization.k8s.io/rolebindings/*
Microsoft.ContainerService/fleets/rbac.authorization.k8s.io/roles/*
Microsoft.ContainerService/fleets/replicationcontrollers/*
Microsoft.ContainerService/fleets/replicationcontrollers/*
Microsoft.ContainerService/fleets/resourcequotas/read Lê cotas de recursos
Microsoft.ContainerService/frotas/segredos/*
Microsoft.ContainerService/fleets/serviceaccounts/*
Microsoft.ContainerService/frotas/serviços/*
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "Grants read/write access to Kubernetes resources within a namespace in the fleet-managed hub cluster - provides write permissions on most objects within a a namespace, with the exception of ResourceQuota object and the namespace object itself. Applying this role at cluster scope will give access across all namespaces.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/434fb43a-c01c-447e-9f67-c3ad923cfaba",
  "name": "434fb43a-c01c-447e-9f67-c3ad923cfaba",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.ContainerService/fleets/read",
        "Microsoft.ContainerService/fleets/listCredentials/action"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.ContainerService/fleets/apps/controllerrevisions/read",
        "Microsoft.ContainerService/fleets/apps/daemonsets/*",
        "Microsoft.ContainerService/fleets/apps/deployments/*",
        "Microsoft.ContainerService/fleets/apps/statefulsets/*",
        "Microsoft.ContainerService/fleets/authorization.k8s.io/localsubjectaccessreviews/write",
        "Microsoft.ContainerService/fleets/autoscaling/horizontalpodautoscalers/*",
        "Microsoft.ContainerService/fleets/batch/cronjobs/*",
        "Microsoft.ContainerService/fleets/batch/jobs/*",
        "Microsoft.ContainerService/fleets/configmaps/*",
        "Microsoft.ContainerService/fleets/endpoints/*",
        "Microsoft.ContainerService/fleets/events.k8s.io/events/read",
        "Microsoft.ContainerService/fleets/events/read",
        "Microsoft.ContainerService/fleets/extensions/daemonsets/*",
        "Microsoft.ContainerService/fleets/extensions/deployments/*",
        "Microsoft.ContainerService/fleets/extensions/ingresses/*",
        "Microsoft.ContainerService/fleets/extensions/networkpolicies/*",
        "Microsoft.ContainerService/fleets/limitranges/read",
        "Microsoft.ContainerService/fleets/namespaces/read",
        "Microsoft.ContainerService/fleets/networking.k8s.io/ingresses/*",
        "Microsoft.ContainerService/fleets/networking.k8s.io/networkpolicies/*",
        "Microsoft.ContainerService/fleets/persistentvolumeclaims/*",
        "Microsoft.ContainerService/fleets/policy/poddisruptionbudgets/*",
        "Microsoft.ContainerService/fleets/rbac.authorization.k8s.io/rolebindings/*",
        "Microsoft.ContainerService/fleets/rbac.authorization.k8s.io/roles/*",
        "Microsoft.ContainerService/fleets/replicationcontrollers/*",
        "Microsoft.ContainerService/fleets/replicationcontrollers/*",
        "Microsoft.ContainerService/fleets/resourcequotas/read",
        "Microsoft.ContainerService/fleets/secrets/*",
        "Microsoft.ContainerService/fleets/serviceaccounts/*",
        "Microsoft.ContainerService/fleets/services/*"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Fleet Manager RBAC Admin",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Kubernetes Fleet Manager RBAC Cluster Admin

Concede acesso de leitura/gravação a todos os recursos do Kubernetes no cluster de hub gerenciado pela frota.

Mais informações

Ações Descrição
Microsoft.Authorization/*/read Ler funções e atribuições de funções
Microsoft.Resources/subscriptions/operationresults/read Obtenha os resultados da operação de subscrição.
Microsoft.Recursos/subscrições/leitura Obtém a lista de assinaturas.
Microsoft.Resources/subscriptions/resourceGroups/read Obtém ou lista grupos de recursos.
Microsoft.ContainerService/fleets/read Obter frota
Microsoft.ContainerService/fleets/listCredentials/action Listar credenciais da frota
NotActions
nenhum
DataActions
Microsoft.ContainerService/frotas/*
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "Grants read/write access to all Kubernetes resources in the fleet-managed hub cluster.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/18ab4d3d-a1bf-4477-8ad9-8359bc988f69",
  "name": "18ab4d3d-a1bf-4477-8ad9-8359bc988f69",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.ContainerService/fleets/read",
        "Microsoft.ContainerService/fleets/listCredentials/action"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.ContainerService/fleets/*"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Fleet Manager RBAC Cluster Admin",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Kubernetes Fleet Manager RBAC Reader

Concede acesso somente leitura à maioria dos recursos do Kubernetes dentro de um namespace no cluster de hub gerenciado por frota. Ele não permite a visualização de funções ou associações de funções. Essa função não permite a visualização de Segredos, uma vez que a leitura do conteúdo de Segredos permite o acesso às credenciais ServiceAccount no namespace, o que permitiria o acesso à API como qualquer ServiceAccount no namespace (uma forma de escalonamento de privilégios). A aplicação dessa função no escopo do cluster dará acesso a todos os namespaces.

Mais informações

Ações Descrição
Microsoft.Authorization/*/read Ler funções e atribuições de funções
Microsoft.Resources/subscriptions/operationresults/read Obtenha os resultados da operação de subscrição.
Microsoft.Recursos/subscrições/leitura Obtém a lista de assinaturas.
Microsoft.Resources/subscriptions/resourceGroups/read Obtém ou lista grupos de recursos.
Microsoft.ContainerService/fleets/read Obter frota
Microsoft.ContainerService/fleets/listCredentials/action Listar credenciais da frota
NotActions
nenhum
DataActions
Microsoft.ContainerService/fleets/apps/controllerrevisions/read Lê revisões do controlador
Microsoft.ContainerService/fleets/apps/daemonsets/read Lê daemonsets
Microsoft.ContainerService/fleets/apps/deployments/read Lê implantações
Microsoft.ContainerService/fleets/apps/statefulsets/read Lê statefulsets
Microsoft.ContainerService/fleets/autoscaling/horizontalpodautoscalers/read Lê horizontalpodautoscalers
Microsoft.ContainerService/fleets/batch/cronjobs/read Lê cronjobs
Microsoft.ContainerService/fleets/batch/jobs/read Lê trabalhos
Microsoft.ContainerService/fleets/configmaps/read Lê configmaps
Microsoft.ContainerService/fleets/endpoints/read Lê pontos de extremidade
Microsoft.ContainerService/fleets/events.k8s.io/events/read Lê eventos
Microsoft.ContainerService/fleets/events/read Lê eventos
Microsoft.ContainerService/fleets/extensions/daemonsets/read Lê daemonsets
Microsoft.ContainerService/fleets/extensions/deployments/read Lê implantações
Microsoft.ContainerService/fleets/extensions/ingresses/read Lê ingressos
Microsoft.ContainerService/fleets/extensions/networkpolicies/read Lê políticas de rede
Microsoft.ContainerService/fleets/limitranges/read Intervalos de limites de leitura
Microsoft.ContainerService/fleets/namespaces/read Lê namespaces
Microsoft.ContainerService/fleets/networking.k8s.io/ingresses/read Lê ingressos
Microsoft.ContainerService/fleets/networking.k8s.io/networkpolicies/read Lê políticas de rede
Microsoft.ContainerService/fleets/persistentvolumeclaims/read Lê declarações de volume persistentes
Microsoft.ContainerService/fleets/policy/poddisruptionbudgets/read Lê poddisruptionbudgets
Microsoft.ContainerService/fleets/replicationcontrollers/read Lê controladores de replicação
Microsoft.ContainerService/fleets/replicationcontrollers/read Lê controladores de replicação
Microsoft.ContainerService/fleets/resourcequotas/read Lê cotas de recursos
Microsoft.ContainerService/fleets/serviceaccounts/read Lê contas de serviço
Microsoft.ContainerService/fleets/services/read Serviços de leitura
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "Grants read-only access to most Kubernetes resources within a namespace in the fleet-managed hub cluster. It does not allow viewing roles or role bindings. This role does not allow viewing Secrets, since reading the contents of Secrets enables access to ServiceAccount credentials in the namespace, which would allow API access as any ServiceAccount in the namespace (a form of privilege escalation).  Applying this role at cluster scope will give access across all namespaces.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/30b27cfc-9c84-438e-b0ce-70e35255df80",
  "name": "30b27cfc-9c84-438e-b0ce-70e35255df80",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.ContainerService/fleets/read",
        "Microsoft.ContainerService/fleets/listCredentials/action"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.ContainerService/fleets/apps/controllerrevisions/read",
        "Microsoft.ContainerService/fleets/apps/daemonsets/read",
        "Microsoft.ContainerService/fleets/apps/deployments/read",
        "Microsoft.ContainerService/fleets/apps/statefulsets/read",
        "Microsoft.ContainerService/fleets/autoscaling/horizontalpodautoscalers/read",
        "Microsoft.ContainerService/fleets/batch/cronjobs/read",
        "Microsoft.ContainerService/fleets/batch/jobs/read",
        "Microsoft.ContainerService/fleets/configmaps/read",
        "Microsoft.ContainerService/fleets/endpoints/read",
        "Microsoft.ContainerService/fleets/events.k8s.io/events/read",
        "Microsoft.ContainerService/fleets/events/read",
        "Microsoft.ContainerService/fleets/extensions/daemonsets/read",
        "Microsoft.ContainerService/fleets/extensions/deployments/read",
        "Microsoft.ContainerService/fleets/extensions/ingresses/read",
        "Microsoft.ContainerService/fleets/extensions/networkpolicies/read",
        "Microsoft.ContainerService/fleets/limitranges/read",
        "Microsoft.ContainerService/fleets/namespaces/read",
        "Microsoft.ContainerService/fleets/networking.k8s.io/ingresses/read",
        "Microsoft.ContainerService/fleets/networking.k8s.io/networkpolicies/read",
        "Microsoft.ContainerService/fleets/persistentvolumeclaims/read",
        "Microsoft.ContainerService/fleets/policy/poddisruptionbudgets/read",
        "Microsoft.ContainerService/fleets/replicationcontrollers/read",
        "Microsoft.ContainerService/fleets/replicationcontrollers/read",
        "Microsoft.ContainerService/fleets/resourcequotas/read",
        "Microsoft.ContainerService/fleets/serviceaccounts/read",
        "Microsoft.ContainerService/fleets/services/read"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Fleet Manager RBAC Reader",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Kubernetes Fleet Manager RBAC Writer

Concede acesso de leitura/gravação à maioria dos recursos do Kubernetes dentro de um namespace no cluster de hub gerenciado pela frota. Essa função não permite exibir ou modificar funções ou associações de função. No entanto, essa função permite acessar Secrets como qualquer ServiceAccount no namespace, para que possa ser usada para obter os níveis de acesso à API de qualquer ServiceAccount no namespace.  A aplicação dessa função no escopo do cluster dará acesso a todos os namespaces.

Mais informações

Ações Descrição
Microsoft.Authorization/*/read Ler funções e atribuições de funções
Microsoft.Resources/subscriptions/operationresults/read Obtenha os resultados da operação de subscrição.
Microsoft.Recursos/subscrições/leitura Obtém a lista de assinaturas.
Microsoft.Resources/subscriptions/resourceGroups/read Obtém ou lista grupos de recursos.
Microsoft.ContainerService/fleets/read Obter frota
Microsoft.ContainerService/fleets/listCredentials/action Listar credenciais da frota
NotActions
nenhum
DataActions
Microsoft.ContainerService/fleets/apps/controllerrevisions/read Lê revisões do controlador
Microsoft.ContainerService/fleets/apps/daemonsets/*
Microsoft.ContainerService/fleets/apps/deployments/*
Microsoft.ContainerService/fleets/apps/statefulsets/*
Microsoft.ContainerService/fleets/autoscaling/horizontalpodautoscalers/*
Microsoft.ContainerService/fleets/batch/cronjobs/*
Microsoft.ContainerService/fleets/batch/jobs/*
Microsoft.ContainerService/fleets/configmaps/*
Microsoft.ContainerService/frotas/endpoints/*
Microsoft.ContainerService/fleets/events.k8s.io/events/read Lê eventos
Microsoft.ContainerService/fleets/events/read Lê eventos
Microsoft.ContainerService/fleets/extensions/daemonsets/*
Microsoft.ContainerService/fleets/extensions/deployments/*
Microsoft.ContainerService/fleets/extensions/ingresses/*
Microsoft.ContainerService/fleets/extensions/networkpolicies/*
Microsoft.ContainerService/fleets/limitranges/read Intervalos de limites de leitura
Microsoft.ContainerService/fleets/namespaces/read Lê namespaces
Microsoft.ContainerService/fleets/networking.k8s.io/ingresses/*
Microsoft.ContainerService/fleets/networking.k8s.io/networkpolicies/*
Microsoft.ContainerService/fleets/persistentvolumeclaims/*
Microsoft.ContainerService/fleets/policy/poddisruptionbudgets/*
Microsoft.ContainerService/fleets/replicationcontrollers/*
Microsoft.ContainerService/fleets/replicationcontrollers/*
Microsoft.ContainerService/fleets/resourcequotas/read Lê cotas de recursos
Microsoft.ContainerService/frotas/segredos/*
Microsoft.ContainerService/fleets/serviceaccounts/*
Microsoft.ContainerService/frotas/serviços/*
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "Grants read/write access to most Kubernetes resources within a namespace in the fleet-managed hub cluster. This role does not allow viewing or modifying roles or role bindings. However, this role allows accessing Secrets as any ServiceAccount in the namespace, so it can be used to gain the API access levels of any ServiceAccount in the namespace.  Applying this role at cluster scope will give access across all namespaces.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/5af6afb3-c06c-4fa4-8848-71a8aee05683",
  "name": "5af6afb3-c06c-4fa4-8848-71a8aee05683",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.ContainerService/fleets/read",
        "Microsoft.ContainerService/fleets/listCredentials/action"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.ContainerService/fleets/apps/controllerrevisions/read",
        "Microsoft.ContainerService/fleets/apps/daemonsets/*",
        "Microsoft.ContainerService/fleets/apps/deployments/*",
        "Microsoft.ContainerService/fleets/apps/statefulsets/*",
        "Microsoft.ContainerService/fleets/autoscaling/horizontalpodautoscalers/*",
        "Microsoft.ContainerService/fleets/batch/cronjobs/*",
        "Microsoft.ContainerService/fleets/batch/jobs/*",
        "Microsoft.ContainerService/fleets/configmaps/*",
        "Microsoft.ContainerService/fleets/endpoints/*",
        "Microsoft.ContainerService/fleets/events.k8s.io/events/read",
        "Microsoft.ContainerService/fleets/events/read",
        "Microsoft.ContainerService/fleets/extensions/daemonsets/*",
        "Microsoft.ContainerService/fleets/extensions/deployments/*",
        "Microsoft.ContainerService/fleets/extensions/ingresses/*",
        "Microsoft.ContainerService/fleets/extensions/networkpolicies/*",
        "Microsoft.ContainerService/fleets/limitranges/read",
        "Microsoft.ContainerService/fleets/namespaces/read",
        "Microsoft.ContainerService/fleets/networking.k8s.io/ingresses/*",
        "Microsoft.ContainerService/fleets/networking.k8s.io/networkpolicies/*",
        "Microsoft.ContainerService/fleets/persistentvolumeclaims/*",
        "Microsoft.ContainerService/fleets/policy/poddisruptionbudgets/*",
        "Microsoft.ContainerService/fleets/replicationcontrollers/*",
        "Microsoft.ContainerService/fleets/replicationcontrollers/*",
        "Microsoft.ContainerService/fleets/resourcequotas/read",
        "Microsoft.ContainerService/fleets/secrets/*",
        "Microsoft.ContainerService/fleets/serviceaccounts/*",
        "Microsoft.ContainerService/fleets/services/*"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Fleet Manager RBAC Writer",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Função de administrador do Azure Kubernetes Service Arc Cluster

Listar ação de credencial de administrador de cluster.

Mais informações

Ações Description
Microsoft.HybridContainerService/provisionedClusterInstances/read Obtém as instâncias de cluster provisionadas do AKS híbrido associadas ao cluster conectado
Microsoft.HybridContainerService/provisionedClusterInstances/listAdminKubeconfig/action Lista as credenciais de administrador de uma instância de cluster provisionada usada somente no modo direto.
Microsoft.Kubernetes/connectedClusters/Leitura Ler connectedClusters
NotActions
nenhum
DataActions
nenhum
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "List cluster admin credential action.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/b29efa5f-7782-4dc3-9537-4d5bc70a5e9f",
  "name": "b29efa5f-7782-4dc3-9537-4d5bc70a5e9f",
  "permissions": [
    {
      "actions": [
        "Microsoft.HybridContainerService/provisionedClusterInstances/read",
        "Microsoft.HybridContainerService/provisionedClusterInstances/listAdminKubeconfig/action",
        "Microsoft.Kubernetes/connectedClusters/Read"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Service Arc Cluster Admin Role",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Função de Usuário do Azure Kubernetes Service Arc Cluster

Listar ação de credencial de usuário do cluster.

Mais informações

Ações Description
Microsoft.HybridContainerService/provisionedClusterInstances/read Obtém as instâncias de cluster provisionadas do AKS híbrido associadas ao cluster conectado
Microsoft.HybridContainerService/provisionedClusterInstances/listUserKubeconfig/action Lista as credenciais de usuário do AAD de uma instância de cluster provisionada usada somente no modo direto.
Microsoft.Kubernetes/connectedClusters/Leitura Ler connectedClusters
NotActions
nenhum
DataActions
nenhum
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "List cluster user credential action.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/233ca253-b031-42ff-9fba-87ef12d6b55f",
  "name": "233ca253-b031-42ff-9fba-87ef12d6b55f",
  "permissions": [
    {
      "actions": [
        "Microsoft.HybridContainerService/provisionedClusterInstances/read",
        "Microsoft.HybridContainerService/provisionedClusterInstances/listUserKubeconfig/action",
        "Microsoft.Kubernetes/connectedClusters/Read"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Service Arc Cluster User Role",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Função de Colaborador do Azure Kubernetes Service Arc

Concede acesso para ler e gravar clusters híbridos dos Serviços Kubernetes do Azure

Mais informações

Ações Description
Microsoft.HybridContainerService/Locations/operationStatuses/read ler operationStatuses
Microsoft.HybridContainerService/Operations/read ler Operações
Microsoft.HybridContainerService/kubernetesVersions/read Lista as versões kubernetes suportadas do local personalizado subjacente
Microsoft.HybridContainerService/kubernetesVersions/write Coloca o tipo de recurso de versão do kubernetes
Microsoft.HybridContainerService/kubernetesVersions/delete Excluir o tipo de recurso de versões do kubernetes
Microsoft.HybridContainerService/provisionedClusterInstances/read Obtém as instâncias de cluster provisionadas do AKS híbrido associadas ao cluster conectado
Microsoft.HybridContainerService/provisionedClusterInstances/write Cria a instância de cluster provisionada do AKS híbrido
Microsoft.HybridContainerService/provisionedClusterInstances/delete Exclui a instância de cluster provisionada do AKS híbrido
Microsoft.HybridContainerService/provisionedClusterInstances/agentPools/read Obtém os pools de agentes na instância de cluster provisionada do AKS híbrido
Microsoft.HybridContainerService/provisionedClusterInstances/agentPools/write Atualiza o pool de agentes na instância de cluster provisionada do AKS híbrido
Microsoft.HybridContainerService/provisionedClusterInstances/agentPools/delete Exclui o pool de agentes na instância de cluster provisionada do AKS híbrido
Microsoft.HybridContainerService/provisionedClusterInstances/upgradeProfiles/read ler upgradeProfiles
Microsoft.HybridContainerService/skus/read Lista as SKUs de VM suportadas do local personalizado subjacente
Microsoft.HybridContainerService/skus/write Coloca o tipo de recurso SKUs da VM
Microsoft.HybridContainerService/skus/delete Exclui o tipo de recurso Vm Sku
Microsoft.HybridContainerService/virtualNetworks/read Lista as redes virtuais AKS híbridas por assinatura
Microsoft.HybridContainerService/virtualNetworks/write Corrige a rede virtual AKS híbrida
Microsoft.HybridContainerService/virtualNetworks/delete Exclui a rede virtual AKS híbrida
Microsoft.ExtendedLocation/customLocations/deploy/action Implantar permissões em um recurso de Local Personalizado
Microsoft.ExtendedLocation/customLocations/read Obtém um recurso de Localização Personalizada
Microsoft.Kubernetes/connectedClusters/Leitura Ler connectedClusters
Microsoft.Kubernetes/connectedClusters/Gravação Grava connectedClusters
Microsoft.Kubernetes/connectedClusters/Excluir Exclui connectedClusters
Microsoft.Kubernetes/connectedClusters/listClusterUserCredential/action Listar clusterCredencial de usuário
Microsoft.AzureStackHCI/clusters/read Obtém clusters
NotActions
nenhum
DataActions
nenhum
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "Grants access to read and write Azure Kubernetes Services hybrid clusters",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/5d3f1697-4507-4d08-bb4a-477695db5f82",
  "name": "5d3f1697-4507-4d08-bb4a-477695db5f82",
  "permissions": [
    {
      "actions": [
        "Microsoft.HybridContainerService/Locations/operationStatuses/read",
        "Microsoft.HybridContainerService/Operations/read",
        "Microsoft.HybridContainerService/kubernetesVersions/read",
        "Microsoft.HybridContainerService/kubernetesVersions/write",
        "Microsoft.HybridContainerService/kubernetesVersions/delete",
        "Microsoft.HybridContainerService/provisionedClusterInstances/read",
        "Microsoft.HybridContainerService/provisionedClusterInstances/write",
        "Microsoft.HybridContainerService/provisionedClusterInstances/delete",
        "Microsoft.HybridContainerService/provisionedClusterInstances/agentPools/read",
        "Microsoft.HybridContainerService/provisionedClusterInstances/agentPools/write",
        "Microsoft.HybridContainerService/provisionedClusterInstances/agentPools/delete",
        "Microsoft.HybridContainerService/provisionedClusterInstances/upgradeProfiles/read",
        "Microsoft.HybridContainerService/skus/read",
        "Microsoft.HybridContainerService/skus/write",
        "Microsoft.HybridContainerService/skus/delete",
        "Microsoft.HybridContainerService/virtualNetworks/read",
        "Microsoft.HybridContainerService/virtualNetworks/write",
        "Microsoft.HybridContainerService/virtualNetworks/delete",
        "Microsoft.ExtendedLocation/customLocations/deploy/action",
        "Microsoft.ExtendedLocation/customLocations/read",
        "Microsoft.Kubernetes/connectedClusters/Read",
        "Microsoft.Kubernetes/connectedClusters/Write",
        "Microsoft.Kubernetes/connectedClusters/Delete",
        "Microsoft.Kubernetes/connectedClusters/listClusterUserCredential/action",
        "Microsoft.AzureStackHCI/clusters/read"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Service Arc Contributor Role",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Função de Administrador do Cluster de Serviço do Kubernetes do Azure

Listar ação de credencial de administrador de cluster.

Mais informações

Ações Description
Microsoft.ContainerService/managedClusters/listClusterAdminCredential/action Listar a credencial clusterAdmin de um cluster gerenciado
Microsoft.ContainerService/managedClusters/accessProfiles/listCredential/action Obter um perfil de acesso gerenciado ao cluster por nome de função usando a credencial de lista
Microsoft.ContainerService/managedClusters/read Obter um cluster gerenciado
Microsoft.ContainerService/managedClusters/runcommand/action Execute o comando user issued no servidor kubernetes gerenciado.
NotActions
nenhum
DataActions
nenhum
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "List cluster admin credential action.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/0ab0b1a8-8aac-4efd-b8c2-3ee1fb270be8",
  "name": "0ab0b1a8-8aac-4efd-b8c2-3ee1fb270be8",
  "permissions": [
    {
      "actions": [
        "Microsoft.ContainerService/managedClusters/listClusterAdminCredential/action",
        "Microsoft.ContainerService/managedClusters/accessProfiles/listCredential/action",
        "Microsoft.ContainerService/managedClusters/read",
        "Microsoft.ContainerService/managedClusters/runcommand/action"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Service Cluster Admin Role",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Usuário de Monitoramento de Cluster de Serviço do Kubernetes do Azure

Listar ação de credencial de usuário de monitoramento de cluster.

Ações Description
Microsoft.ContainerService/managedClusters/listClusterMonitoringUserCredential/action Listar a credencial clusterMonitoringUser de um cluster gerenciado
Microsoft.ContainerService/managedClusters/read Obter um cluster gerenciado
NotActions
nenhum
DataActions
nenhum
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "List cluster monitoring user credential action.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/1afdec4b-e479-420e-99e7-f82237c7c5e6",
  "name": "1afdec4b-e479-420e-99e7-f82237c7c5e6",
  "permissions": [
    {
      "actions": [
        "Microsoft.ContainerService/managedClusters/listClusterMonitoringUserCredential/action",
        "Microsoft.ContainerService/managedClusters/read"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Service Cluster Monitoring User",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Função de Usuário do Cluster de Serviço do Kubernetes do Azure

Listar ação de credencial de usuário do cluster.

Mais informações

Ações Description
Microsoft.ContainerService/managedClusters/listClusterUserCredential/action Listar a credencial clusterUser de um cluster gerenciado
Microsoft.ContainerService/managedClusters/read Obter um cluster gerenciado
NotActions
nenhum
DataActions
nenhum
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "List cluster user credential action.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/4abbcc35-e782-43d8-92c5-2d3f1bd2253f",
  "name": "4abbcc35-e782-43d8-92c5-2d3f1bd2253f",
  "permissions": [
    {
      "actions": [
        "Microsoft.ContainerService/managedClusters/listClusterUserCredential/action",
        "Microsoft.ContainerService/managedClusters/read"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Service Cluster User Role",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Função de Contribuidor do Azure Kubernetes Service

Concede acesso para ler e gravar clusters do Serviço Kubernetes do Azure

Mais informações

Ações Descrição
Microsoft.Authorization/*/read Ler funções e atribuições de funções
Microsoft.ContainerService/locais/* Ler locais disponíveis para recursos do ContainerService
Microsoft.ContainerService/managedClusters/* Criar e gerenciar um cluster gerenciado
Microsoft.ContainerService/managedclustersnapshots/* Criar e gerenciar um instantâneo de cluster gerenciado
Microsoft.ContainerService/snapshots/* Criar e gerenciar um snapshot
Microsoft.Insights/alertRules/* Criar e gerenciar um alerta de métrica clássica
Microsoft.Recursos/implantações/* Criar e gerenciar uma implantação
Microsoft.Resources/subscriptions/resourceGroups/read Obtém ou lista grupos de recursos.
NotActions
nenhum
DataActions
nenhum
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "Grants access to read and write Azure Kubernetes Service clusters",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/ed7f3fbd-7b88-4dd4-9017-9adb7ce333f8",
  "name": "ed7f3fbd-7b88-4dd4-9017-9adb7ce333f8",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.ContainerService/locations/*",
        "Microsoft.ContainerService/managedClusters/*",
        "Microsoft.ContainerService/managedclustersnapshots/*",
        "Microsoft.ContainerService/snapshots/*",
        "Microsoft.Insights/alertRules/*",
        "Microsoft.Resources/deployments/*",
        "Microsoft.Resources/subscriptions/resourceGroups/read"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Service Contributor Role",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Kubernetes Service RBAC Admin

Permite gerenciar todos os recursos em cluster/namespace, exceto atualizar ou excluir cotas de recursos e namespaces.

Mais informações

Ações Descrição
Microsoft.Authorization/*/read Ler funções e atribuições de funções
Microsoft.Resources/subscriptions/operationresults/read Obtenha os resultados da operação de subscrição.
Microsoft.Recursos/subscrições/leitura Obtém a lista de assinaturas.
Microsoft.Resources/subscriptions/resourceGroups/read Obtém ou lista grupos de recursos.
Microsoft.ContainerService/managedClusters/listClusterUserCredential/action Listar a credencial clusterUser de um cluster gerenciado
NotActions
nenhum
DataActions
Microsoft.ContainerService/managedClusters/*
NotDataActions
Microsoft.ContainerService/managedClusters/resourcequotas/write Grava cotas de recursos
Microsoft.ContainerService/managedClusters/resourcequotas/delete Exclui cotas de recursos
Microsoft.ContainerService/managedClusters/namespaces/write Grava namespaces
Microsoft.ContainerService/managedClusters/namespaces/delete Exclui namespaces
{
  "assignableScopes": [
    "/"
  ],
  "description": "Lets you manage all resources under cluster/namespace, except update or delete resource quotas and namespaces.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/3498e952-d568-435e-9b2c-8d77e338d7f7",
  "name": "3498e952-d568-435e-9b2c-8d77e338d7f7",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.ContainerService/managedClusters/listClusterUserCredential/action"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.ContainerService/managedClusters/*"
      ],
      "notDataActions": [
        "Microsoft.ContainerService/managedClusters/resourcequotas/write",
        "Microsoft.ContainerService/managedClusters/resourcequotas/delete",
        "Microsoft.ContainerService/managedClusters/namespaces/write",
        "Microsoft.ContainerService/managedClusters/namespaces/delete"
      ]
    }
  ],
  "roleName": "Azure Kubernetes Service RBAC Admin",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Kubernetes Service RBAC Cluster Admin

Permite gerenciar todos os recursos no cluster.

Mais informações

Ações Descrição
Microsoft.Authorization/*/read Ler funções e atribuições de funções
Microsoft.Resources/subscriptions/operationresults/read Obtenha os resultados da operação de subscrição.
Microsoft.Recursos/subscrições/leitura Obtém a lista de assinaturas.
Microsoft.Resources/subscriptions/resourceGroups/read Obtém ou lista grupos de recursos.
Microsoft.ContainerService/managedClusters/listClusterUserCredential/action Listar a credencial clusterUser de um cluster gerenciado
NotActions
nenhum
DataActions
Microsoft.ContainerService/managedClusters/*
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "Lets you manage all resources in the cluster.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/b1ff04bb-8a4e-4dc4-8eb5-8693973ce19b",
  "name": "b1ff04bb-8a4e-4dc4-8eb5-8693973ce19b",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.ContainerService/managedClusters/listClusterUserCredential/action"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.ContainerService/managedClusters/*"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Service RBAC Cluster Admin",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Azure Kubernetes Service RBAC Reader

Permite acesso somente leitura para ver a maioria dos objetos em um namespace. Ele não permite a visualização de funções ou associações de funções. Essa função não permite a visualização de Segredos, uma vez que a leitura do conteúdo de Segredos permite o acesso às credenciais ServiceAccount no namespace, o que permitiria o acesso à API como qualquer ServiceAccount no namespace (uma forma de escalonamento de privilégios). A aplicação dessa função no escopo do cluster dará acesso a todos os namespaces.

Mais informações

Ações Descrição
Microsoft.Authorization/*/read Ler funções e atribuições de funções
Microsoft.Resources/subscriptions/operationresults/read Obtenha os resultados da operação de subscrição.
Microsoft.Recursos/subscrições/leitura Obtém a lista de assinaturas.
Microsoft.Resources/subscriptions/resourceGroups/read Obtém ou lista grupos de recursos.
NotActions
nenhum
DataActions
Microsoft.ContainerService/managedClusters/apps/controllerrevisions/read Lê revisões do controlador
Microsoft.ContainerService/managedClusters/apps/daemonsets/read Lê daemonsets
Microsoft.ContainerService/managedClusters/apps/deployments/read Lê implantações
Microsoft.ContainerService/managedClusters/apps/replicasets/read Lê conjuntos de réplicas
Microsoft.ContainerService/managedClusters/apps/statefulsets/read Lê statefulsets
Microsoft.ContainerService/managedClusters/autoscaling/horizontalpodautoscalers/read Lê horizontalpodautoscalers
Microsoft.ContainerService/managedClusters/batch/cronjobs/read Lê cronjobs
Microsoft.ContainerService/managedClusters/batch/jobs/read Lê trabalhos
Microsoft.ContainerService/managedClusters/configmaps/read Lê configmaps
Microsoft.ContainerService/managedClusters/discovery.k8s.io/endpointslices/read Lê endpointslices
Microsoft.ContainerService/managedClusters/endpoints/read Lê pontos de extremidade
Microsoft.ContainerService/managedClusters/events.k8s.io/events/read Lê eventos
Microsoft.ContainerService/managedClusters/events/read Lê eventos
Microsoft.ContainerService/managedClusters/extensions/daemonsets/read Lê daemonsets
Microsoft.ContainerService/managedClusters/extensions/deployments/read Lê implantações
Microsoft.ContainerService/managedClusters/extensions/ingresses/read Lê ingressos
Microsoft.ContainerService/managedClusters/extensions/networkpolicies/read Lê políticas de rede
Microsoft.ContainerService/managedClusters/extensions/replicasets/read Lê conjuntos de réplicas
Microsoft.ContainerService/managedClusters/limitranges/read Intervalos de limites de leitura
Microsoft.ContainerService/managedClusters/metrics.k8s.io/pods/read Lê pods
Microsoft.ContainerService/managedClusters/metrics.k8s.io/nodes/read Lê nós
Microsoft.ContainerService/managedClusters/namespaces/read Lê namespaces
Microsoft.ContainerService/managedClusters/networking.k8s.io/ingresses/read Lê ingressos
Microsoft.ContainerService/managedClusters/networking.k8s.io/networkpolicies/read Lê políticas de rede
Microsoft.ContainerService/managedClusters/persistentvolumeclaims/read Lê declarações de volume persistentes
Microsoft.ContainerService/managedClusters/pods/read Lê pods
Microsoft.ContainerService/managedClusters/policy/poddisruptionbudgets/read Lê poddisruptionbudgets
Microsoft.ContainerService/managedClusters/replicationcontrollers/read Lê controladores de replicação
Microsoft.ContainerService/managedClusters/resourcequotas/read Lê cotas de recursos
Microsoft.ContainerService/managedClusters/serviceaccounts/read Lê contas de serviço
Microsoft.ContainerService/managedClusters/services/read Serviços de leitura
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "Allows read-only access to see most objects in a namespace. It does not allow viewing roles or role bindings. This role does not allow viewing Secrets, since reading the contents of Secrets enables access to ServiceAccount credentials in the namespace, which would allow API access as any ServiceAccount in the namespace (a form of privilege escalation). Applying this role at cluster scope will give access across all namespaces.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/7f6c6a51-bcf8-42ba-9220-52d62157d7db",
  "name": "7f6c6a51-bcf8-42ba-9220-52d62157d7db",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.ContainerService/managedClusters/apps/controllerrevisions/read",
        "Microsoft.ContainerService/managedClusters/apps/daemonsets/read",
        "Microsoft.ContainerService/managedClusters/apps/deployments/read",
        "Microsoft.ContainerService/managedClusters/apps/replicasets/read",
        "Microsoft.ContainerService/managedClusters/apps/statefulsets/read",
        "Microsoft.ContainerService/managedClusters/autoscaling/horizontalpodautoscalers/read",
        "Microsoft.ContainerService/managedClusters/batch/cronjobs/read",
        "Microsoft.ContainerService/managedClusters/batch/jobs/read",
        "Microsoft.ContainerService/managedClusters/configmaps/read",
        "Microsoft.ContainerService/managedClusters/discovery.k8s.io/endpointslices/read",
        "Microsoft.ContainerService/managedClusters/endpoints/read",
        "Microsoft.ContainerService/managedClusters/events.k8s.io/events/read",
        "Microsoft.ContainerService/managedClusters/events/read",
        "Microsoft.ContainerService/managedClusters/extensions/daemonsets/read",
        "Microsoft.ContainerService/managedClusters/extensions/deployments/read",
        "Microsoft.ContainerService/managedClusters/extensions/ingresses/read",
        "Microsoft.ContainerService/managedClusters/extensions/networkpolicies/read",
        "Microsoft.ContainerService/managedClusters/extensions/replicasets/read",
        "Microsoft.ContainerService/managedClusters/limitranges/read",
        "Microsoft.ContainerService/managedClusters/metrics.k8s.io/pods/read",
        "Microsoft.ContainerService/managedClusters/metrics.k8s.io/nodes/read",
        "Microsoft.ContainerService/managedClusters/namespaces/read",
        "Microsoft.ContainerService/managedClusters/networking.k8s.io/ingresses/read",
        "Microsoft.ContainerService/managedClusters/networking.k8s.io/networkpolicies/read",
        "Microsoft.ContainerService/managedClusters/persistentvolumeclaims/read",
        "Microsoft.ContainerService/managedClusters/pods/read",
        "Microsoft.ContainerService/managedClusters/policy/poddisruptionbudgets/read",
        "Microsoft.ContainerService/managedClusters/replicationcontrollers/read",
        "Microsoft.ContainerService/managedClusters/resourcequotas/read",
        "Microsoft.ContainerService/managedClusters/serviceaccounts/read",
        "Microsoft.ContainerService/managedClusters/services/read"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Service RBAC Reader",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Gravador RBAC do Serviço Kubernetes do Azure

Permite acesso de leitura/gravação à maioria dos objetos em um namespace. Essa função não permite exibir ou modificar funções ou associações de função. No entanto, essa função permite acessar Secrets e executar Pods como qualquer ServiceAccount no namespace, para que possa ser usada para obter os níveis de acesso à API de qualquer ServiceAccount no namespace. A aplicação dessa função no escopo do cluster dará acesso a todos os namespaces.

Mais informações

Ações Descrição
Microsoft.Authorization/*/read Ler funções e atribuições de funções
Microsoft.Resources/subscriptions/operationresults/read Obtenha os resultados da operação de subscrição.
Microsoft.Recursos/subscrições/leitura Obtém a lista de assinaturas.
Microsoft.Resources/subscriptions/resourceGroups/read Obtém ou lista grupos de recursos.
NotActions
nenhum
DataActions
Microsoft.ContainerService/managedClusters/apps/controllerrevisions/read Lê revisões do controlador
Microsoft.ContainerService/managedClusters/apps/daemonsets/*
Microsoft.ContainerService/managedClusters/apps/deployments/*
Microsoft.ContainerService/managedClusters/apps/replicasets/*
Microsoft.ContainerService/managedClusters/apps/statefulsets/*
Microsoft.ContainerService/managedClusters/autoscaling/horizontalpodautoscalers/*
Microsoft.ContainerService/managedClusters/batch/cronjobs/*
Microsoft.ContainerService/managedClusters/coordination.k8s.io/leases/read Lê arrendamentos
Microsoft.ContainerService/managedClusters/coordination.k8s.io/leases/write Escreve arrendamentos
Microsoft.ContainerService/managedClusters/coordination.k8s.io/leases/delete Exclui concessões
Microsoft.ContainerService/managedClusters/discovery.k8s.io/endpointslices/read Lê endpointslices
Microsoft.ContainerService/managedClusters/batch/jobs/*
Microsoft.ContainerService/managedClusters/configmaps/*
Microsoft.ContainerService/managedClusters/endpoints/*
Microsoft.ContainerService/managedClusters/events.k8s.io/events/read Lê eventos
Microsoft.ContainerService/managedClusters/events/*
Microsoft.ContainerService/managedClusters/extensions/daemonsets/*
Microsoft.ContainerService/managedClusters/extensions/deployments/*
Microsoft.ContainerService/managedClusters/extensions/ingresses/*
Microsoft.ContainerService/managedClusters/extensions/networkpolicies/*
Microsoft.ContainerService/managedClusters/extensions/replicasets/*
Microsoft.ContainerService/managedClusters/limitranges/read Intervalos de limites de leitura
Microsoft.ContainerService/managedClusters/metrics.k8s.io/pods/read Lê pods
Microsoft.ContainerService/managedClusters/metrics.k8s.io/nodes/read Lê nós
Microsoft.ContainerService/managedClusters/namespaces/read Lê namespaces
Microsoft.ContainerService/managedClusters/networking.k8s.io/ingresses/*
Microsoft.ContainerService/managedClusters/networking.k8s.io/networkpolicies/*
Microsoft.ContainerService/managedClusters/persistentvolumeclaims/*
Microsoft.ContainerService/managedClusters/pods/*
Microsoft.ContainerService/managedClusters/policy/poddisruptionbudgets/*
Microsoft.ContainerService/managedClusters/replicationcontrollers/*
Microsoft.ContainerService/managedClusters/resourcequotas/read Lê cotas de recursos
Microsoft.ContainerService/managedClusters/secrets/*
Microsoft.ContainerService/managedClusters/serviceaccounts/*
Microsoft.ContainerService/managedClusters/services/*
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "Allows read/write access to most objects in a namespace.This role does not allow viewing or modifying roles or role bindings. However, this role allows accessing Secrets and running Pods as any ServiceAccount in the namespace, so it can be used to gain the API access levels of any ServiceAccount in the namespace. Applying this role at cluster scope will give access across all namespaces.",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/a7ffa36f-339b-4b5c-8bdf-e2c188b2c0eb",
  "name": "a7ffa36f-339b-4b5c-8bdf-e2c188b2c0eb",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read"
      ],
      "notActions": [],
      "dataActions": [
        "Microsoft.ContainerService/managedClusters/apps/controllerrevisions/read",
        "Microsoft.ContainerService/managedClusters/apps/daemonsets/*",
        "Microsoft.ContainerService/managedClusters/apps/deployments/*",
        "Microsoft.ContainerService/managedClusters/apps/replicasets/*",
        "Microsoft.ContainerService/managedClusters/apps/statefulsets/*",
        "Microsoft.ContainerService/managedClusters/autoscaling/horizontalpodautoscalers/*",
        "Microsoft.ContainerService/managedClusters/batch/cronjobs/*",
        "Microsoft.ContainerService/managedClusters/coordination.k8s.io/leases/read",
        "Microsoft.ContainerService/managedClusters/coordination.k8s.io/leases/write",
        "Microsoft.ContainerService/managedClusters/coordination.k8s.io/leases/delete",
        "Microsoft.ContainerService/managedClusters/discovery.k8s.io/endpointslices/read",
        "Microsoft.ContainerService/managedClusters/batch/jobs/*",
        "Microsoft.ContainerService/managedClusters/configmaps/*",
        "Microsoft.ContainerService/managedClusters/endpoints/*",
        "Microsoft.ContainerService/managedClusters/events.k8s.io/events/read",
        "Microsoft.ContainerService/managedClusters/events/*",
        "Microsoft.ContainerService/managedClusters/extensions/daemonsets/*",
        "Microsoft.ContainerService/managedClusters/extensions/deployments/*",
        "Microsoft.ContainerService/managedClusters/extensions/ingresses/*",
        "Microsoft.ContainerService/managedClusters/extensions/networkpolicies/*",
        "Microsoft.ContainerService/managedClusters/extensions/replicasets/*",
        "Microsoft.ContainerService/managedClusters/limitranges/read",
        "Microsoft.ContainerService/managedClusters/metrics.k8s.io/pods/read",
        "Microsoft.ContainerService/managedClusters/metrics.k8s.io/nodes/read",
        "Microsoft.ContainerService/managedClusters/namespaces/read",
        "Microsoft.ContainerService/managedClusters/networking.k8s.io/ingresses/*",
        "Microsoft.ContainerService/managedClusters/networking.k8s.io/networkpolicies/*",
        "Microsoft.ContainerService/managedClusters/persistentvolumeclaims/*",
        "Microsoft.ContainerService/managedClusters/pods/*",
        "Microsoft.ContainerService/managedClusters/policy/poddisruptionbudgets/*",
        "Microsoft.ContainerService/managedClusters/replicationcontrollers/*",
        "Microsoft.ContainerService/managedClusters/resourcequotas/read",
        "Microsoft.ContainerService/managedClusters/secrets/*",
        "Microsoft.ContainerService/managedClusters/serviceaccounts/*",
        "Microsoft.ContainerService/managedClusters/services/*"
      ],
      "notDataActions": []
    }
  ],
  "roleName": "Azure Kubernetes Service RBAC Writer",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Cluster Conectado Gerenciado Identity CheckAccess Reader

Função interna que permite que uma identidade gerenciada do Cluster Conectado chame a API checkAccess

Mais informações

Ações Descrição
Microsoft.Authorization/*/read Ler funções e atribuições de funções
NotActions
nenhum
DataActions
nenhum
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "Built-in role that allows a Connected Cluster managed identity to call the checkAccess API",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/65a14201-8f6c-4c28-bec4-12619c5a9aaa",
  "name": "65a14201-8f6c-4c28-bec4-12619c5a9aaa",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Connected Cluster Managed Identity CheckAccess Reader",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Operador sem agente do Kubernetes

Concede ao Microsoft Defender for Cloud acesso aos Serviços Kubernetes do Azure

Mais informações

Ações Description
Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/write Criar ou atualizar associações de função de acesso confiável para cluster gerenciado
Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/read Obter associações de função de acesso confiável para cluster gerenciado
Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/delete Excluir associações de função de acesso confiável para cluster gerenciado
Microsoft.ContainerService/managedClusters/read Obter um cluster gerenciado
Microsoft.Features/features/read Obtém os recursos de uma assinatura.
Microsoft.Features/providers/features/read Obtém o recurso de uma assinatura em um determinado provedor de recursos.
Microsoft.Features/providers/features/register/action Registra o recurso para uma assinatura em um determinado provedor de recursos.
Microsoft.Security/pricings/securityoperators/read Obtém os operadores de segurança para o escopo
NotActions
nenhum
DataActions
nenhum
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "Grants Microsoft Defender for Cloud access to Azure Kubernetes Services",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/d5a2ae44-610b-4500-93be-660a0c5f5ca6",
  "name": "d5a2ae44-610b-4500-93be-660a0c5f5ca6",
  "permissions": [
    {
      "actions": [
        "Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/write",
        "Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/read",
        "Microsoft.ContainerService/managedClusters/trustedAccessRoleBindings/delete",
        "Microsoft.ContainerService/managedClusters/read",
        "Microsoft.Features/features/read",
        "Microsoft.Features/providers/features/read",
        "Microsoft.Features/providers/features/register/action",
        "Microsoft.Security/pricings/securityoperators/read"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Kubernetes Agentless Operator",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Kubernetes Cluster - Azure Arc Onboarding

Definição de função para autorizar qualquer usuário/serviço a criar o recurso connectedClusters

Mais informações

Ações Descrição
Microsoft.Authorization/*/read Ler funções e atribuições de funções
Microsoft.Insights/alertRules/* Criar e gerenciar um alerta de métrica clássica
Microsoft.Resources/deployments/write Cria ou atualiza uma implantação.
Microsoft.Resources/subscriptions/operationresults/read Obtenha os resultados da operação de subscrição.
Microsoft.Recursos/subscrições/leitura Obtém a lista de assinaturas.
Microsoft.Resources/subscriptions/resourceGroups/read Obtém ou lista grupos de recursos.
Microsoft.Kubernetes/connectedClusters/Gravação Grava connectedClusters
Microsoft.Kubernetes/connectedClusters/read Ler connectedClusters
Microsoft.Suporte/* Criar e atualizar um ticket de suporte
NotActions
nenhum
DataActions
nenhum
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "Role definition to authorize any user/service to create connectedClusters resource",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/34e09817-6cbe-4d01-b1a2-e0eac5743d41",
  "name": "34e09817-6cbe-4d01-b1a2-e0eac5743d41",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Insights/alertRules/*",
        "Microsoft.Resources/deployments/write",
        "Microsoft.Resources/subscriptions/operationresults/read",
        "Microsoft.Resources/subscriptions/read",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.Kubernetes/connectedClusters/Write",
        "Microsoft.Kubernetes/connectedClusters/read",
        "Microsoft.Support/*"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Kubernetes Cluster - Azure Arc Onboarding",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Colaborador de extensão do Kubernetes

Pode criar, atualizar, obter, listar e excluir extensões do Kubernetes e obter operações assíncronas de extensão

Ações Descrição
Microsoft.Authorization/*/read Ler funções e atribuições de funções
Microsoft.Insights/alertRules/* Criar e gerenciar um alerta de métrica clássica
Microsoft.Recursos/implantações/* Criar e gerenciar uma implantação
Microsoft.Resources/subscriptions/resourceGroups/read Obtém ou lista grupos de recursos.
Microsoft.KubernetesConfiguração/extensões/gravação Cria ou atualiza o recurso de extensão.
Microsoft.KubernetesConfiguração/extensões/leitura Obtém recurso de instância de extensão.
Microsoft.KubernetesConfiguration/extensions/delete Exclui o recurso de instância de extensão.
Microsoft.KubernetesConfiguration/extensions/operations/read Obtém o status da operação assíncrona.
NotActions
nenhum
DataActions
nenhum
NotDataActions
nenhum
{
  "assignableScopes": [
    "/"
  ],
  "description": "Can create, update, get, list and delete Kubernetes Extensions, and get extension async operations",
  "id": "/providers/Microsoft.Authorization/roleDefinitions/85cb6faf-e071-4c9b-8136-154b5a04f717",
  "name": "85cb6faf-e071-4c9b-8136-154b5a04f717",
  "permissions": [
    {
      "actions": [
        "Microsoft.Authorization/*/read",
        "Microsoft.Insights/alertRules/*",
        "Microsoft.Resources/deployments/*",
        "Microsoft.Resources/subscriptions/resourceGroups/read",
        "Microsoft.KubernetesConfiguration/extensions/write",
        "Microsoft.KubernetesConfiguration/extensions/read",
        "Microsoft.KubernetesConfiguration/extensions/delete",
        "Microsoft.KubernetesConfiguration/extensions/operations/read"
      ],
      "notActions": [],
      "dataActions": [],
      "notDataActions": []
    }
  ],
  "roleName": "Kubernetes Extension Contributor",
  "roleType": "BuiltInRole",
  "type": "Microsoft.Authorization/roleDefinitions"
}

Próximos passos