Azure Cloud (Microsoft)
Link SaltCloudAzure , Azure/Kubernetes
AZ cli tool
AZ cli
$ docker run -it microsoft/azure-cli az login
In the AZ cli, create a principal account to be used by automation https://docs.microsoft.com/en-us/cli/azure/create-an-azure-service-principal-azure-cli?view=azure-cli-latest
AZ cli SP (Service Principal)
- SP is userid used by a app with limited access.
List roles for ID:"06a.....68" on subscription "Non-prod"
az role assignment list --all --assignee "06a.....68" --subscription "Non-prod"
Logged in to AZ with your own account you can create a SP and give it access to a RG e.g.
az role assignment list --assignee "06a.....68" --resource-group rg-k8s --subscription "Non-prod"
AZ find all public IP's / VM's
az network public-ip list --subscription <abc> az vm list-usage --location australiaeast -o table export sub=<"subscription"> az vm show --show-details --ids $(az vm list --subscription $sub --query "[].id" -o tsv) | jq .
AZ find a image
2018 - https://docs.microsoft.com/en-us/cli/azure/vm/image?view=azure-cli-latest
- az configure --defaults location=
- az vm image list-publishers --location
Powershell
- Powershell on Linux using docker
$ docker pull mcr.microsoft.com/powershell
$ docker run -it microsoft/powershell
- Run azure
$ azure login info: Executing command login - Authenticating...info: To sign in, use a web browser to open the page https://microsoft.com/devicelogin and enter the code HAY8K6VD6 to authenticate. info: Added subscription Free Trial + info: login command OK pieter@Azure:~$
Get details
$ az account show
Create a service account
$ az ad sp create-for-rbac --name "SALT-ADMIN" { "appId": "a0a000-0000-00000-0000-20", "displayName": "SALT-ADMIN", "name": "http://SALT-ADMIN", "password": "20000000-0000-0000-0000-000000000005", "tenant": "20000000-0000-0000-0000-000000000003" }
# az ad sp show --id http://SALT-ADMIN
# az ad sp credential reset --name http://SALT-ADMIN
create ResourceGroup
az group create -n testRG -l "Australia East"
saltazurekeyringsecret ...