Nirmata uses Azure Active Directory for authentication. Ensure that Azure AD is setup before adding Microsoft Azure as a Cloud Provider in Nirmata.
Click here for instructions on setting up Azure Active Directory.
To add Microsoft Azure as a Cloud Provider in Nirmata, enter the Subscription ID, Tenant ID, Client ID, and Client Secret.
Creating an Azure App Registration for Nirmata
Next, create an Azure Application in the Resources Group of Azure . This application will be used for Nirmata deployment.
To create an Azure Application:
- Login to the Azure portal .
- From the sidebar menu, select Azure Active Directory > App Registration.
- Select New App Registration.
- In the Register an application page, enter the app registration Name, Select Accounts in this organizational directory only (Default Directory only - Single tenant) under Supported account types, Enter
https://www.nirmata.ioas the Web interface under Redirect URI (optional) .
- Once, you App Registration is created, Note Application (client) ID, Directory (tenant) ID.
Generating the Client Secret (Client Key)
In the Azure portal, in App registrations, select your application.
Select Certificates & secrets > Client secrets > New client secret.
Add a description for your client secret.
Select an expiration for the secret or specify a custom lifetime.
- Client secret lifetime is limited to two years (24 months) or less. You can’t specify a custom lifetime longer than 24 months.
- Microsoft recommends that you set an expiration value of less than 12 months.
Record the secret’s value for use in your client application code. This secret value is never displayed again after you leave this page.
- Confirming Network Security Groups are Configured Correctly :Review Microsoft Azure Network Security groups and apply the correct security levels.
- Confirming Accessible Storage Account: Refer Accessible Storage Account for instructions on creating accessible storage account.
- Note: If the cluster requires public access, ensure to allow public IP’s to the nodes and to configure the networking security groups to allow SSH.
- For a increased security, create a bastion host in the same subnet with a public IP. Then configure ssh to each node from a single point.
Adding Microsoft Azure Cloud Provider to Nirmata
From Cloud Credentials tab, click +Add Cloud Credentials. The Add Cloud Credentials screen appears.
Enter a name and select Microsoft Azure from type dropdown.
Enter description and click Next.
In the Settings tab, enter the details for Subscription ID, Tenant ID, Client ID, and Client Secret.
Your Azure Cloud Credential is configured when the Validate screen displays Success status.
Once the Azure account access is validated, setup an Nirmata Managed Cluster or create a Cluster Type .