bored-sunset-10957
07/23/2024, 2:48 PMaz login --identity
az keyvault secret set --name <secret_name> --vault-name <vault_name>
on the keyvault, the managed identity has been given reader and key vault secrets officer. (Keyv is set to RBAC). Since i can run above statements from the associated VMs with success, I assume access is working.
Yet, enabling pulumi to utilize the managed identity always returns the following error:
error: autorest/azure: Service returned an error. Status=403 Code="AuthorizationFailed" Message="The client '<client obj id>' with object id <client obj id>' does not have authorization to perform action 'Microsoft.KeyVault/vaults/secrets/write' over scope '/subscriptions/<subscription>/resourceGroups/<resource group>/providers/Microsoft.KeyVault/vaults/<vault_name>/secrets/<secret name>' or the scope is invalid. If access was recently granted, please refresh your credentials."
I checked all the object ids and paths a million time by now but can not find any inconsistencies.
pulumis python sdk is utilized and the following variables are set as env_vars for LocalWorkspaceOptions:
...
'ARM_USE_MSI': true
'ARM_SUBSCRIPTION_ID': <subscription>
...
Can anyone point me to what I am missing here?big-architect-71258
07/29/2024, 7:40 AMenableRbacAuthorization
is set to true? https://www.pulumi.com/registry/packages/azure/api-docs/keyvault/keyvault/#enablerbacauthorization_nodejsbig-architect-71258
07/29/2024, 7:40 AM(Keyv is set to RBAC)
.big-architect-71258
07/29/2024, 8:03 AMbored-sunset-10957
07/29/2024, 9:40 AMbig-architect-71258
07/29/2024, 9:44 AMbored-sunset-10957
07/31/2024, 7:03 AMNo matter how you like to participate in developer communities, Pulumi wants to meet you there. If you want to meet other Pulumi users to share use-cases and best practices, contribute code or documentation, see us at an event, or just tell a story about something cool you did with Pulumi, you are part of our community.
Powered by