Closed mikeoleary closed 4 years ago
Hi, AUTOSDK-431 has been created to track this.
Hi Mike,
For your questions:
a) we are tracking the check or dry-run RFE with internal ID AUTOSDK-376
b) The documentation states
"Certain resources such as the virtual network are commonly deployed in a seperate resource group, ensure the correct scopes are applied to all applicable resource groups."
https://clouddocs.f5.com/products/extensions/f5-cloud-failover/latest/userguide/azure.html#rbac-role-definition
If you don't have any other concern, I shall close this item.
Hi Krithika, OK, thanks, I appreciate that and closing this issue sounds good to me. Mike
did this MSI get updated? I think that I'm running into the same scenario, but with a UDR that exists in another resource group
The answer is yes, this issue has the same rights problems with a UDR in another route, as a workaround add the Virtual Machine created MSI into the other RG for access to update a UDR.
for SEO, Route Table updates in different Resource Groups
Issue Description
My customer found that Ipconfigs were successfully deleted from Device1 but failed to be created on Device2 due to permissions errors. CFE logs below.
Customer deployed a supported ARM template, then created additional VIPs using public IP addresses from a different RG.
Since the Managed Identity for the VM's is only permissioned at the RG in which the BIG-IP is deployed, it did not have write permissions over the public IP.
I noticed that in issue #31 there was a reference to AUTOSDK-376 that would target a feature that might check for missing dependencies. My main question here is:
a) could we have some kind of permissions check prior to, or at the time of failover, so that we can avoid hitting permission errors after the ipconfigs have been successfully deleted but before they are created on the other device, or
b) could we document the requirement that public IP's must be in the appropriate RG's or have appropriate permissions in place in order to failover correctly? Currently there is a reference to RG's and permissions in the FAQ but it may help to call out public IP's as these may get created much later than BIG-IPs, potentially by different teams.
Workaround
Steps to Recreate
CFE log file
I can provide the full log file but I have copied the lines from this failover event below, and manually removed any GUID's and object names: