-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow Machine ID non-VM resources to utilize Azure Join method #28689
Comments
Is there a specific Azure container solution you have in mind that I'll be able to test this with ? I'm not 100% sure that this won't work and it may be a case of us being too prohibitive in the docs - so if you give me some more information about which Azure container product you're using, I can check this, and then I can have the docs changed. |
Container Instances and/or Container Apps |
Thanks - have you attempted to configure this yet ? Or is this an assumption purely from the statement in the docs ? If you have attempted it, at what stage did you receive an error or were blocked by the inability to configure something ? |
I tried this in a Container Instance sometime last week and it was failing on the |
I'll try and fit in some time to repro next week and we can establish a priority on this getting fixed from there :) |
Thanks @strideynet I just re-tested on an Azure Container Instance so I could provide the error that is seen: tbot start \ Teleport Cloud version 13.1.5 |
That's great - thank you ! |
TestingContainer instancehttps://learn.microsoft.com/en-gb/azure/container-instances/container-instances-managed-identity With no system identity or user identity assigned, the IMDS hangs/is not present. I am unable to get a response With system identity assigned, I am able to curl the IMDS and fetch an access token:
This contains the following claims:
Attempting to fetch the Attested Data Document does not work:
This means our existing Azure joining method will not be compatible, since that relies on the Attested Data document. We may wish to consider modifying the existing join method or introducing a new join method which can work on access tokens alone (albeit, identity tokens would be preferred). |
Any ETA on when either of those solutions could be implemented or added to the roadmap? |
Use case: Provision an AKS cluster via terraform, and get a |
Related to #38852 |
What would you like Teleport to do?
Allow Machine ID non-VM resources to utilize Azure Join method
What problem does this solve?
We currently have a use case for Teleport processes running on container solutions in Azure that need to be able to automatically authenticate themselves when they are launched. My understanding is that the currently Machine ID Azure Join implementation only works for Virtual Machine resources in Azure
https://goteleport.com/docs/agents/join-services-to-your-cluster/azure/
Prerequisites
An Azure Virtual Machine running Linux with the Teleport binary installed. The Virtual Machine must have a Managed Identity assigned to it with permission to read virtual machine info
If a workaround exists, please include it.
The text was updated successfully, but these errors were encountered: