AZ CLI
Account
Login
az account login --output table
Login to AAD
az login --scope https://graph.microsoft.com//.default --use-device-code --output table
Set subscription
az account set --subscription 8b20XXXX-XXXX-XXXX-XXXX-e255
Or using alias:
set_sub_SUB_NAME
I plan to write more on this kind aliases in one my other docs
Resource groups
Prerequisite for the following tasks is subscription set.
List groups
az group list --query '[].name' -o tsv
Save the required group name as env variable
AZ_RG_NAME='tfstates'
Storage accounts
List accounts
az storage account list --query '[].name' -o tsv
Save the required storage account name as env variable
AZ_SA_NAME='gdp19prodtfstates'
Get account key
AZ_SA_KEY=$(az storage account keys list --account-name $AZ_SA_NAME --resource-group $AZ_RG_NAME --query "[0].{value:value}" --output tsv)
List containers
az storage container list --account-name $AZ_SA_NAME --account-key $AZ_SA_KEY --query '[].name' -o tsv
Save the required container name as env variable
AZ_SA_CO_NAME='tfstates'
List blobs
az storage blob list --account-name $AZ_SA_NAME --account-key $AZ_SA_KEY --container-name $AZ_SA_CO_NAME --query "[].{name:name}" --output tsv
Create a snapshot for a blob
az storage blob snapshot --account-name $AZ_SA_NAME --account-key $AZ_SA_KEY --container-name $AZ_SA_CO_NAME --name prod-03-gdp-base.tfstate
Manually add subnets to Storage Accounts FW
az storage account network-rule add -g alz-gdp-dph4dadevenv-gdp-base-customer-rg --account-name datalake2gprodmjkdq2 --subnet /subscriptions/c807d85d-12ae-474e-89ad-32f960be7a9a/resourceGroups/rgp-p-we1-sharedservices-aks2/providers/Microsoft.Network/virtualNetworks/vnet-p-we1-03/subnets/sub-p-we1-aks2-44.142.14.0-23
az storage account network-rule add -g alz-gdp-dph4dadevenv-gdp-base-customer-rg --account-name datalake2gprodmjkdq2 --subnet /subscriptions/c807d85d-12ae-474e-89ad-32f960be7a9a/resourceGroups/rgp-p-we1-sharedservices-aks/providers/Microsoft.Network/virtualNetworks/vnet-p-we1-02/subnets/sub-p-we1-aks-44.133.40.0-22
Get all IPs that accessed to the storage account
az monitor activity-log list --offset 30d --subscription $AZ_SUB_NAME --resource-id $AZ_SA_IS | egrep 'ipaddr|clientIpAddress' | sort -u
```
### Accessing storage accounts from within the pod
For this purpose we will use the image gdp-cli
```bash
apiVersion: apps/v1
kind: Deployment
metadata:
name: gdp-cli-deployment
namespace: gdp-svc-jupyterhub-bi
labels:
app: gdp-cli
spec:
replicas: 1
selector:
matchLabels:
app: gdp-cli
template:
metadata:
labels:
app: gdp-cli
aadpodidbinding: prodazesbiqubprodh56xw-msi-binding
spec:
containers:
- name: gdp-cli
command:
- bash
- -c
- "sleep 3600"
image: AZ_ACR_FQDN/gdp-cli
resources:
requests:
cpu: 10m
memory: 32Mi
limits:
cpu: 100m
memory: 512Mi
root@gdp-cli-deployment-544fdd486-mrpgz:/# curl "http://169.254.169.254/metadata/identity/oauth2/token?api-version=2018-02-01&resource=https://management.azure.com/" -H "Metadata: true"
root@gdp-cli-deployment-544fdd486-mrpgz:/# az storage blob list --account-name $SA_NAME --auth-mode "login" -c data-aria --query "[].name"
[
"df_test.pq",
"df_test.pq/_SUCCESS",
"df_test.pq/part-00000-9fc51678-1e59-444b-a4eb-33b9c4e34065-c000.snappy.parquet",
"flow.log",
"test",
"test/test.txt",
"text.txt"
]
Get Storage Account Auth Key and create a snapshot
export SUB_NAME="my_awesome_sub"
export SA_RG_NAME="my_awesome_rg"
export SA_NAME="my_awesome_sa"
export CONTAINER_NAME="my_awesome_container"
export BLOB_NAME="my_awesome_blob"
az account set -s $SUB_NAME
export SA_KEY1=$(az storage account keys list --resource-group $SA_RG_NAME --account-name $SA_NAME --query "[?contains(keyName, 'key1')].value" -otsv)
az storage blob snapshot --account-name $SA_NAME --container-name $CONTAINER_NAME --name $BLOB_NAME --auth-mode key --account-key $SA_KEY1
AKS
Prerequisite for the following tasks are:
List clusters
az aks list --resource-group $AZ_RG_NAME --query '[].name' -o tsv
Save the cluster name as env variable
AZ_AKS_CL_NAME=awesome_cluster
Get credentials with admin privileges for kubectl
az aks get-credentials --resource-group $AZ_RG_NAME --name $AZ_AKS_CL_NAME --admin
Get credentials for kubectl for all clusters you have
How many times it happened to you that you got to a bunch of new AKS clusters and you have to get their kubeconfigs by running the same command over and over again. Here is a simple loop that will help you to get the credentials for all clusters you have in all your subscriptions.
for s in $(az account list --output tsv | awk '{print $6" "$3;}' | sort -f | awk '{print $1;}'); do
az account set --subscription $s
echo $s
for cluster in $(az aks list -ojson | jq -r '.[]|[.name + "#" + .resourceGroup]|@tsv'); do
export AZ_AKS_CL_NAME=$(echo $cluster | cut -d '#' -f 1)
export AZ_RG_NAME=$(echo $cluster | cut -d '#' -f 2)
az aks get-credentials --resource-group $AZ_RG_NAME --name $AZ_AKS_CL_NAME --overwrite-existing
done
done
The above loop can be rewritten in a form of nested loops in case there is need for something like that.
Find out if the addon blob csi driver is enabled in cluster
> az aks show -n $AZ_AKS_CL_NAME -g $AZ_RG_NAME | jq -r ".storageProfile.blobCsiDriver"
{
"enabled": false
}
Enable the addon blob csi driver
az aks update --enable-blob-driver -n $AZ_AKS_CL_NAME -g $AZ_RG_NAME
Please make sure there is no open-source Blob CSI driver installed before enabling. (y/N): y
/ Running ..
Disable the addon blob csi driver
❯ az aks update --disable-blob-driver -n $AZ_AKS_CL_NAME -g $AZ_RG_NAME
Please make sure there are no existing PVs and PVCs that are used by Blob CSI driver before disabling. (y/N): y
{
"aadProfile": {
"adminGroupObjectIDs": [
...
Pretty printed aks node pools configuration
for l in $(az aks nodepool list --resource-group $AZ_RG_NAME --cluster-name $AZ_AKS_CL_NAME | jq -r '["Name", "AutoScaling", "Count", "MinCount", "MaxCount", "MaxPods"], (.[]|[.name, .enableAutoScaling, .count, .minCount, .maxCount, .maxPods])|@csv'); do printf "|%-20s | %-15s | %+8s | %+8s | %+8s| %+8s|\n" $(echo $l| tr "," " "| tr -d "\""); done
Upgrade control plane only
❯ az aks upgrade --kubernetes-version 1.25.6 --resource-group $AZ_RG_NAME --name $AZ_AKS_CL_NAME --control-plane-only
Fix failed upgrade pipeline - nodepool version
❯ az aks nodepool list --resource-group $AZ_RG_NAME --cluster-name $AZ_AKS_CL_NAME --query "[].{Name:name}" -otsv
❯ az aks nodepool upgrade --resource-group $AZ_RG_NAME --cluster-name $AZ_AKS_CL_NAME --node-image-only --name $NODEPOOL_NAME
Azure network
List endpoints in subscription
az network private-endpoint list --subscription gdp-20-westeurope-prod | jq -r '.[] | .id[15:51] as $subId | .customDnsConfigs[] | [ $subId, .name, .ipAddresses[0], .fqdn ] | @tsv'
Cleaning private dns zone - a records
subName='PLEASE USE THE CORRECT SUB NAME'
dnsZone=$(az network private-dns zone list --subscription ${subName} --query "[?contains(name, 'AZ_CLOUD_DOMAIN_SUFFIX')].{name:name}" -o tsv)
dnsRG=$(az network private-dns zone list --subscription ${subName} --query "[?contains(name, 'AZ_CLOUD_DOMAIN_SUFFIX')].{resourceGroup:resourceGroup}" -o tsv)
az network private-dns record-set a list \
--resource-group ${dnsRG} \
--zone-name ${dnsZone} \
--query "[?aRecords[0].ipv4Address == '44.142.46.8'].name" -o tsv | \
xargs -t -L 1 -P 3 az network private-dns record-set a delete \
--resource-group ${dnsRG}\
--zone-name ${dnsZone} \
-y \
--name || true
Cleaning private dns zone - txt records
az network private-dns record-set txt list --resource-group ${dnsRG} \
--zone-name ${dnsZone} --subscription ${subName} \
--query "[?contains(txtRecords[0].value[0],'owner=default')].{name:name}" -o tsv | \
xargs -I {name} -t -P10 az network private-dns record-set txt delete \
--resource-group ${dnsRG} --zone-name ${dnsZone} \
--subscription ${subName} --yes --name {name}
Check if subscription has a certain route in any of the routing tables
❯ az account set --subscription 2e02f0e9-XXX-XXXX-XXXX-XXXXXXXX
❯ for l in $(az network vnet list --query "[].{name:name, rg:resourceGroup}" -otsv); do
resourceGroup=$(echo $l | awk -F "\t" '{print $2;}')
vnetName=$(echo $l | awk -F "\t" '{print $1;}')
#az network route-table list --resource-group "${resourceGroup}"
for rtName in $(az network route-table list --resource-group "${resourceGroup}" --query "[].{name:name}" -otsv); do
az network route-table route list --route-table-name "${rtName}" --resource-group "${resourceGroup}" | jq '.[].name'
done
done | grep "to-scc-afw"
List private endpoints for storage accounts in one subscription
for rg in $(az group list --query "[?starts_with(name, 'alz-gdp-')].name" -o TSV); do
az network private-endpoint list -g $rg | jq '.[]|.customDnsConfigs|map(select(.fqdn | match("blob|file|dfs")))' | jq -rC 'select(. | length > 0)|.[] | [.fqdn, .ipAddresses[0]] | @tsv';
done | column -t
List private endpoints for storage accounts in one subscription - xarg version
az group list --query "[?starts_with(name, 'alz-gdp-')].name" -o TSV | xargs -n1 -P5 az network private-endpoint list --resource-group | jq '.[]|.customDnsConfigs|map(select(.fqdn | match("blob|file|dfs")))' | jq -rC 'select(. | length > 0)|.[] | [.fqdn, .ipAddresses[0]] | @tsv' | column -t
List private endpoints for storage accounts in one subscription - PowerShell version
((az group list -o json | ConvertFrom-Json ) |? name -match "^alz-gdp-.*").name | % -Parallel {az network private-endpoint list --resource-group $_ -ojson | ConvertFrom-Json}).customDnsConfigs |? fqdn -Match "blob|file|dfs"
List private endpoints of postgres databases without a CT DNS record
for s in $(az account list --output tsv | awk '{print $6" "$3;}' | egrep -v 'sharedservices|del1eam|devops|deletgdptest|gdp-65-westeurope-prod_dataroom-mvp' | sort -f | awk '{print $1;}'); do
az account set --subscription $s
for psn in $(az postgres server list --query '[].[name]' -otsv);do
for f in $(az network private-endpoint list --query "[?name == '$psn-endpoint'].customDnsConfigs[0].fqdn" -otsv|grep $psn);do
a_recorder=$(dig +short $f A | tr "\n" " ")
echo $a_recorder | grep -q '44\.'
[[ $? -ne 0 ]] && echo "$f\n\tA:\t$a_recorder"
done
done
done
List subnets and route tables for one subscription
OIFS=$IFS
IFS=$'\n'
for l in $(az network vnet list --query "[].{name:name, rg:resourceGroup}" -otsv); do
resourceGroup=$(echo $l | awk -F "\t" '{print $2;}')
vnetName=$(echo $l | awk -F "\t" '{print $1;}')
#echo "$vnetName $resourceGroup"
for subnetName in $(az network vnet subnet list --resource-group "${resourceGroup}" --vnet-name "${vnetName}" --query "[?contains(name, 'int')].{name:name,ap:addressPrefix}" -otsv); do
sn=$(echo "$subnetName" | column -t | awk -F"-" '{print $4;}')
az network route-table show -g "${resourceGroup}" -n "rt-p-we1-${sn}"
done
done
IFS=$OIFS
List all pubint networks and IP ranges
for s in $(az account list --output tsv | awk '{print $6" "$3;}' | egrep -v 'sharedservices|del1eam|devops|deletgdptest|gdp-65-westeurope-prod_dataroom-mvp' | sort -f | awk '{print $2;}'); do
az account set --subscription $s
OIFS=$IFS
IFS=$'\n'
for l in $(az network vnet list --query "[].{name:name, rg:resourceGroup}" -otsv); do
resourceGroup=$(echo $l | awk -F "\t" '{print $2;}')
vnetName=$(echo $l | awk -F "\t" '{print $1;}')
#echo "$vnetName $resourceGroup"
for subnetName in $(az network vnet subnet list --resource-group "${resourceGroup}" --vnet-name "${vnetName}" --query "[?contains(name, 'pubint')].{name:name,ap:addressPrefix}" -otsv); do
echo "$resourceGroup\t$subnetName" | column -t
done
done
IFS=$OIFS
done
List all vnet subnets and IP ranges
for s in $(az account list --output tsv | awk '{print $6" "$3;}' | egrep -v 'SUBNAME1|SUBNAME2' | sort -f | awk '{print $2;}'); do
az account set --subscription $s
OIFS=$IFS
IFS=$'\n'
for l in $(az network vnet list --query "[].{name:name, rg:resourceGroup}" -otsv); do
resourceGroup=$(echo $l | awk -F "\t" '{print $2;}')
vnetName=$(echo $l | awk -F "\t" '{print $1;}')
#echo "$vnetName $resourceGroup"
for subnetName in $(az network vnet subnet list --resource-group "${resourceGroup}" --vnet-name "${vnetName}" --query "[?contains(name, 'int')].{name:name,ap:addressPrefix}" -otsv); do
echo "$resourceGroup\t$subnetName" | column -t
done
done
IFS=$OIFS
done
AZ VMs
List SKU
az vm image list --all --publisher Canonical --location westeurope | jq '[.[] | select(.sku | match("20_04-lts-gen2"))]'
List all VMs for all subscriptions
for s in `az account subscription list --query "[?contains(displayName, 'gdp') || contains(displayName, 'dsp') || contains(displayName, 'GDP') || contains(displayName, 'DSP')].displayName" -o TSV`; do \
for g in `az group list --query "[*].name" -o TSV --subscription $s | grep -Ev '^MC_'`; do \
for v in `az vm list --query "[*].name" -o TSV --subscription $s --resource-group $g`; do echo "$s - $g: $v" \
done; \
done; \
done
Azure PostgreSQL
List postgres server configuration
❯ az postgres server configuration list -g alz-gdp-dpmidcorp-gdp-base-customer-rg --server-name dpmidcorp-int --query "[].{name:name, value:value}" -oTSV | sort | egrep 'work_mem|maintenance_work_mem|effective_cache_size'
autovacuum_work_mem -1
effective_cache_size 4194304
maintenance_work_mem 2097151
work_mem 204800
❯ az postgres server configuration list -g alz-gdp-dpmidcorp-gdp-base-customer-rg --server-name dpmidcorp-prod --query "[].{name:name, value:value}" -oTSV | sort | egrep 'work_mem|maintenance_work_mem|effective_cache_size'
autovacuum_work_mem -1
effective_cache_size 4194304
maintenance_work_mem 2097151
work_mem 204800
ACR
Login to ACR with HELM
❯ export AZ_ACR_NAME='<ACR_NAME>'
❯ export AZ_ACR_FQDN="${AZ_ACR_NAME}.azurecr.io"
❯ accessToken=$(az acr login --name $AZ_ACR_NAME --expose-token | jq -r '.accessToken')
❯ echo $accessToken | helm registry login $AZ_ACR_FQDN \
--username 00000000-0000-0000-0000-000000000000 \
--password-stdin
Login Succeeded
Importing images to the ACR
❯ accessToken=$(az acr login --name <ACR_NAME> --expose-token | jq -r '.accessToken')
WARNING: You can perform manual login using the provided access token below, for example: 'docker login loginServer -u 00000000-0000-0000-0000-000000000000 -p accessToken'
❯ docker login loginServer -u 00000000-0000-0000-0000-000000000000 -p $accessToken
❯ az acr login --name AZ_ACR_FQDN
❯ az acr import --name <ACR_NAME> --source index.docker.io/prometheus-operator/prometheus-operator:v0.53.1 --username 0XXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXd --password SP_PASSWORD
Azure AD - Service principals and applications
Resetting the credentials for PROXY OIDC
Warn
This functionality is removed from newer versions of AZ CLI
❯ kgd -n gdp-ingress traefik-forward-auth -oyaml
❯ az ad app credential reset --id $OBJECT_ID -p $PASSWORD --years 2
❯ az ad app show --id 5fXXXXXX-XXXX-XXXX-XXXX-XXXX29291b8e
❯ k delete pod -n gdp-ingress traefik-forward-auth-669f696d69-rgr9c
List the serivce principal with the know displayName
https_proxy="http://PROXY_FQDN:80" az ad sp list --display-name alz-gdp-dlab-aks
Reset credentials (to do this we need to run it from jenkins pods) - deprecated
The password we can get from IAM-STAGE tfstate file. The filed is ``
az ad app credential reset --id OBJECT_ID --password PASSWORD --years 2
List expired passwords for SPs
date_warn=$(date -u +"%FT%H:%M:%S.%sZ" -d "$(date +"%Y-%m-%d") + 30 day")
now_date=$(date -u +"%FT%H:%M:%S.%sZ")
while read -r name app expiryDate; do
if [[ "${name}" != "*msi*" ]]; then
if [[ ${now_date} > ${expiryDate} ]]; then
message="*EXPIREDrm .zshrc! AAD APPLICATION ${name} with AppID ${app} have credential that has expired. Expiry Date: ${expiryDate}"
elif [[ ${date_warn} > ${expiryDate} ]]; then
message="AAD APPLICATION ${name} with appID ${app} have credential that will expire in less than 30 days. Expiry Date: ${expiryDate}"
else
message=""
fi
[[ ! -z ${message} ]] && echo ${message}
fi
done <<< "$(az ad app list --filter "startswith(displayName, 'alz-gdp')" --query "[?contains(displayName,'dns') || contains(displayName,'aks')][displayName, objectId, passwordCredentials[].endDate[]|[0]]" -o tsv)"
Get role assignments for AAD Group
export AZ_SUB_NAME="<Your subscription name>"
export AAD_GROUP_NAME="<Your AAD group name>"
AZ_GR_ID=$(az ad group show -g $AAD_GROUP_NAME --query="id" -otsv)
az role assignment list --all --assignee $AZ_GR_ID --query "[].{roleName:roleDefinitionName, scope:scope}" --subscription $AZ_SUB_NAME -o table
LogAnalytics
LogAnalytics query to get the biggest users of the LogAnalytics
find where TimeGenerated between(startofday(ago(30d))..startofday(now())) project _ResourceId, _BilledSize, _IsBillable
| where _IsBillable == true
| summarize BillableDataBytes = sum(_BilledSize) by _ResourceId
| sort by BillableDataBytes nulls last
General
List enabled features in your subscription
az feature list --query "[?(properties.state != 'NotRegistered')].{NAME:name,STATE:properties.state}" -otable ﴃ dsp5-westeurope-dev 16:07:37
NAME STATE
------------------------------------------------------ ------------
Microsoft.AzureStackHCI/SoftwareAssuranceEnabled Registered
Microsoft.Network/AllowUpdateAddressSpaceInPeeredVnets Unregistered
Microsoft.ContainerService/PodSecurityPolicyPreview Registered
...
Microsoft.Storage/HnsSnapshot Pending