Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Kusto cli extension does not support AllDatabasesMonitor role #6876

Open
cchildress opened this issue Oct 19, 2023 · 2 comments
Open

Kusto cli extension does not support AllDatabasesMonitor role #6876

cchildress opened this issue Oct 19, 2023 · 2 comments
Labels
Auto-Assign Auto assign by bot Azure Data Explorer bug This issue requires a change to an existing behavior in the product in order to be resolved. Service Attention This issue is responsible by Azure service team.

Comments

@cchildress
Copy link
Member

Describe the bug

Kusto has a role assignment called AllDatabasesMonitor (docs here). The --role argument is only accepting AllDatabasesAdmin and AllDatabasesViewer.

Related command

az kusto cluster-principal-assignment create --role AllDatabasesMonitor

Errors

az kusto cluster-principal-assignment create: 'AllDatabasesMonitor' is not a valid value for '--role'. Allowed values: AllDatabasesAdmin, AllDatabasesViewer.

Issue script & Debug output

N/A

Expected behavior

The cli should assign the valid role to the specified principal.

Environment Summary

azure-cli 2.53.0

core 2.53.0
telemetry 1.1.0

Extensions:
kusto 0.4.0
resource-graph 2.1.0

Dependencies:
msal 1.24.0b2
azure-mgmt-resource 23.1.0b2

Python location '/opt/az/bin/python3'
Extensions directory '/home/${user}/.azure/cliextensions'

Python (Linux) 3.10.10 (main, Sep 20 2023, 06:08:04) [GCC 9.4.0]

Legal docs and information: aka.ms/AzureCliLegal

Your CLI is up-to-date.

Additional context

No response

@cchildress cchildress added the bug This issue requires a change to an existing behavior in the product in order to be resolved. label Oct 19, 2023
@microsoft-github-policy-service microsoft-github-policy-service bot added Auto-Assign Auto assign by bot Azure Data Explorer Service Attention This issue is responsible by Azure service team. labels Oct 19, 2023
@yonzhan
Copy link
Collaborator

yonzhan commented Oct 19, 2023

Thank you for opening this issue, we will look into it.

@microsoft-github-policy-service
Copy link
Contributor

Thanks for the feedback! We are routing this to the appropriate team for follow-up. cc @ilayrn, @orhasban, @zoharHenMicrosoft, @sagivf, @Aviv-Yaniv.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Auto-Assign Auto assign by bot Azure Data Explorer bug This issue requires a change to an existing behavior in the product in order to be resolved. Service Attention This issue is responsible by Azure service team.
Projects
None yet
Development

No branches or pull requests

2 participants