Skip to content

Best Practice to protect node Metadata endpoint when using AZWI  #676

Open
@primeroz

Description

@primeroz

I am testing Azure Workload Identity , which is working as expected, but i am facing an issue i am not sure how to handle

  • My nodes have a User Assigned identity , used by controllers like azuredisk-csi driver , external cloud controllers and so on with quite wide permissions inside the resourceGroup
  • When testing workload identity with an azure cli pod ( with a properly configured SA and so on )
    • I can assume the right federated UA for the given SA by doing az login --federated-token "$(cat $AZURE_FEDERATED_TOKEN_FILE)" --service-principal -u $AZURE_CLIENT_ID -t $AZURE_TENANT_ID
    • I can assume the node UA Identity with very wide permissions by doing az login --identity

Is there a best practice on how to handle this situation ?

with the now deprecated aad pod identity all requests to the Metadata Servers where intercepted and so a pod was not able to assume the node identity ( or a role not assigned to it ) but with the current implementation of AWI there is nothing preventing this.

At the moment my only idea is to

  • Force all controller pods to the master nodes
  • Reduce scope of UA Identity on worker nodes to the bare minimum (registry access only i think )

I want to understand if this is how the setup is supposed to look like or if i am missing something obvious :)

thanks

Metadata

Metadata

Assignees

No one assigned

    Labels

    questionFurther information is requested

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions