Tips

Azure

Helpful Microsoft Azure cloud tips.

Azure Cloud

The cloud metaphor usually evokes a feeling of something that is experienced without understanding what it is or how it works, and Microsoft Azure cloud computing if no different.

To avoid the hype, let’s approach the Azure Cloud as revolving around two major realms: Resource and Security. This is not how Microsoft typically documents Azure, but it’s a more helpful perspective on how it is put together and how it works. In essence, the Azure cloud can be summarized by its two fundamental realms: Azure Resource Services and Azure Security Services.

Azure Resource Services

What we call Azure Resource Services here is essentially the comprehensive suite of Products and tools to host applications, store data, and enable various services on Microsoft’s Azure cloud. Institutions can access these wide array of Azure Services which include virtual machines (VM), databases, storage solutions, machine learning, artificial intelligence (AI), serverless computing, content delivery networks (CDN), and much more. The functions of these services are primarily managed via the Azure Resource Manager API at https://management.azure.com, and are detailed at https://learn.microsoft.com/en-us/azure/azure-resource-manager. Azure services are the core of the Azure ecosystem.

See below pages for specific tips on specific services:

Azure Security Services

What we call Azure Security Services here is essentially what Microsoft calls its Microsoft Identity Platform, and it plays a fundamental role in the Azure ecosystem, that permeates all of Azure. Like Azure Resources, it is a complementary suite of services that provides several essential cloud identity components, allowing institutions to control and manage access to services and applications that they host on Azure.

Azure Management Hierarchy

To manage access into Azure resource or security services you must first understand that these are indeed two (2) separate realms, but they are very closely intertwined. The Resource Realm is where Azure service objects live, and the Security Realm is where, well, security objects live. Luckily, these realms share the same hierarchy, which starts at the top, within an organization’s Azure tenant.

Note
Stack Overflow has this really good entry, highlighting the relation of these objects within an Azure tenant.

Important:

  1. All security objects are available cross the entire individual tenant’s hierarchy.
  2. Organizations typically have multiple tenants, such as a Development tenant for a testing environment, and a Production one for their live environment, and so on.
  3. Security objects are typically not shared cross tenants, except for special objects that do support a more advanced and rare multi-tenant configuration.
  4. Resource objects that are defined or deployed to only one area of the hierachy, are only available within that area. For instance, if a resource Role Based Access Control (RBAC) role definition is deployed only to subscription A, it cannot be assigned/consumed within subscription B.
  5. It is almost always better to define resource objects, such as resource RBAC role definitions, at the very top of the hierarchy, the Tenant Root Group. That way they are always available to be used anywhere within the entire tenant.
  6. Microsoft Azure makes available native, Built-In Entra ID roles (security realm) as well as resource RBAC roles (resource realm) for each service product offering. Microsoft makes these roles available globally, to every organization with a tenant in Azure cloud.
  7. Many organization choose to create their own Custom roles based on the Built-In ones, because it affords them better version control of these roles. Microsoft is known for changing Built-In role behavior from time to time, and having your own _pinned_version of a role offers more control.

Azure Access Methods

To do work in azure, whether to create resource or security objects, or to manage them, you have to access Azure in one of the following ways:

Method Secret Typical Use
Azure CLI Yes, secured via browser popup Interactive command line
OIDC No CI/CD automation
SP Yes Services and Application automated access
MI No Services and Application automated access

Typical use column only describes the most common reason for using the specific method, but actual usage can vary depending on context.

Azure Virtual Machines

curl -sH "Metadata:true" --noproxy "*"  http://169.254.169.254/metadata/instance?api-version=2021-02-01 | jq

Invoke-RestMethod -Headers @{"Metadata"="true"} -Method GET -NoProxy -Uri "http://169.254.169.254/metadata/instance?api-version=2021-02-01" | ConvertTo-Json -Depth 64

See also https://docs.microsoft.com/en-us/azure/virtual-machines/windows/instance-metadata-service?tabs=windows

Install Azure CLI

The Azure CLI tool (az) is a cross-platform utility that allows you to connect to Azure and execute administrative commands on Azure resources. Follow below table to install and use in the respective OS or environment:

OS Command
macOS brew update && brew install azure-cli
Ubuntu Linux curl -sL https://aka.ms/InstallAzureCLIDeb | sudo bash
Windows <== Click on link
Docker docker run -it mcr.microsoft.com/azure-cli

Create VM

Create a sample Azure VM using the az utility.

SSH to AKS Cluster Node

This is not generally recommended, but there are time, while experimenting in a lower environment when you may need to SSH into an ASK cluster node:

PowerShell

Azure From PowerShell

Install-Module Az
Import-Module Az
Connect-AzAccount blah blah blah
# Find the way to install `pwsh` for your version of Linux
pwsh
# Then run same above commands
brew install powershell
pwsh
# Then same above commands
docker run -it mcr.microsoft.com/azure-powershell pwsh
# Then run same above commands

Common Commands

# List PS version
$PSversionTable

# Logon to Azure (see above section too)
Login-AzAccount

# Get RBAC role definition(s)
$r = Get-AzRoleDefinition "Monitoring Contributor"
$r
$r | ? {$_.IsCustom -eq $true} | FT Name, IsCustom

# Get all role definitions in tenant and store as UTF8 text (makes easier Unix grep parsing, etc)
Get-AzRoleDefinition | ? {$_.IsCustom -eq $true} | ConvertTo-JSON | jq | Out-File -Encoding utf8 custom-roles.json

# Get/Select Specific Azure Subscription
Get-AzSubscription
Select-AzSubscription
Set-AzSubscription

# Update existing role
Get-AzRoleDefinition -Name "Existing Role" | ConvertTo-Json | Out-File existing-role.json
# Modify JSON file accordingly, then
Set-AzRoleDefinition -InputFile "existing-role.json"

# Create new custom role, based on existing
Get-AzRoleDefinition -Name "Existing Role" | ConvertTo-Json | Out-File azure-support-basic.json
# Modify JSON file accordingly, then
New-AzRoleDefinition -InputFile ./azure-support-basic.json

# Install YAML module
Install-Module -Name powershell-yaml -Force -Repository PSGallery -Scope CurrentUser
# Grab from file:
$r = Get-Content -Raw -Path file-path.json | ConvertFrom-Json
# Or query Azure
$r = Get-AzRoleDefinition "Monitoring Contributor"
$j = $r | ConvertTo-Json
$y = $r | ConvertTo-YAML

# Get existing role assignment (to then create one)
$a = Get-AzRoleAssignment [-RoleDefinitionName <String>] -Scope <String> | ConvertTo-Json 

# Create role assignment
$id = (Get-AzAdGroup -DisplayName MYGROUP).Id
New-AzRoleAssignment -RoleDefinition "azure-support-basic" -ObjectId $id

# Remove role
Get-AzureRmRoleDefinition -Name "Virtual Machine Operator" | Remove-AzureRmRoleDefinition

# Remove role assignment
$id = (Get-AzAdGroup -DisplayName MYGROUP).Id
Remove-AzRoleAssignment -ObjectId $id -RoleDefinitionName "azure-support-basic" 

PowerShell Service Principal Login

# Use the application ID as the username, and the secret as password
$credentials = Get-Credential
Connect-AzAccount -ServicePrincipal -Credential $credentials -Tenant <tenant ID>

Create Service Principal

To quickly create an Azure service principal from the CLI, and grant it RBAC role Contributor at a specific subscription scope, run the following:

az ad sp create-for-rbac -n sp-cli-mgmt --role="Contributor" --scopes="/subscriptions/<SubscriptionId>"
{
  "appId": "0c96e907-3875-4989-9e94-ed2f163629cf",
  "displayName": "sp-cli-mgmt",
  "password": "EF-a0RixjI2FlrZbYGBbPR.qBqr1G70AEt",
  "tenant": "e6cbf564-8faa-455b-b339-7cee0c829cf2"
}

If you omit the -n <Name> option, Azure will automatically pick a name like azure-cli-2022-04-03-23-15-00 for you.

WARNING: Use of Microsoft Graph PowerShell SP

Using the built-in Microsoft Graph PowerShell Service Principal to logon to Azure APIs is highly discouraged.

Azure Questions