<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cannot Add VNet/Subnet to Azure Storage Firewall for SAS Viya (AKS) – AuthorizationFail in SAS Viya on Microsoft Azure</title>
    <link>https://communities.sas.com/t5/SAS-Viya-on-Microsoft-Azure/Cannot-Add-VNet-Subnet-to-Azure-Storage-Firewall-for-SAS-Viya/m-p/966155#M428</link>
    <description>&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;P class=""&gt;&lt;STRONG&gt;Hello SAS Community,&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;I have deployed&amp;nbsp;&amp;nbsp;&lt;STRONG&gt;SAS Viya 4 on Azure Kubernetes Service (AKS)&lt;/STRONG&gt; using the &lt;STRONG&gt;Microsoft Marketplace managed application&lt;/STRONG&gt;, and I’ve run into some issues with networking and diagnostics while i try to mount the azure storage into SAS viya&amp;nbsp; . I would appreciate any guidance or insight from those who’ve dealt with similar setups.&lt;/P&gt;&lt;HR /&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":exclamation_mark:"&gt;❗&lt;/span&gt; Issue 1: VNet/Subnet Addition to Storage Account Fails&lt;/P&gt;&lt;P class=""&gt;I'm trying to allow private access to the storage account by adding the &lt;CODE&gt;sas-viya-btsm-vnet&lt;/CODE&gt; and its subnet under:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;Azure Portal → Storage Account → Networking → Firewalls and Virtual Networks&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P class=""&gt;But I encounter an error with this message:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;&lt;SPAN&gt;&amp;nbsp;Failed to enable service endpoints for 1 out of 1 virtual network(s). The client '*************' with object id '9a83f34e-04fb-44ff-9bb1-15f69a6d2532' has permission to perform action 'Microsoft.Network/virtualNetworks/write' on scope '/subscriptions/b13401f4-1d8f-4ae1-ab8a-9ddd1bed0b92/resourceGroups/mrg-sas-viya-on-azure-20250428101250/providers/Microsoft.Network/virtualNetworks/sas-viya-btsm-vnet'; however, it does not have permission to perform action 'Microsoft.Network/networkSecurityGroups/join/action' on the '0' linked scope(s) '' or the linked scope(s) are invalid and is blocked by deny assignments on the '1' linked scope(s) '/subscriptions/b13401f4-1d8f-4ae1-ab8a-9ddd1bed0b92/resourceGroups/mrg-sas-viya-on-azure-20250428101250/providers/Microsoft.Network/networkSecurityGroups/sas-viya-btsm-nsg'.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P class=""&gt;I suspect this is due to RBAC or deny assignments placed by the managed application.&lt;/P&gt;&lt;HR /&gt;&lt;P&gt;🧪 What I've Tried:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P class=""&gt;Confirmed that the AKS cluster is deployed into a private VNet using Azure CNI.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Verified NSG and Azure Firewall rules.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Checked IAM roles assigned to my user and managed identities.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Ran the &lt;CODE&gt;get_k8s_info.sh&lt;/CODE&gt; script (output available).&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Tried using the &lt;STRONG&gt;Azure CLI and Run Command&lt;/STRONG&gt; feature (note: Run Command does not support &lt;CODE&gt;--watch&lt;/CODE&gt; or real-time monitoring).&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;HR /&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":package:"&gt;📦&lt;/span&gt; Environment Details:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;STRONG&gt;SAS Viya Version:&lt;/STRONG&gt;&amp;nbsp;Stable 2025.03&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;STRONG&gt;Deployment Type:&lt;/STRONG&gt; Azure Marketplace – SAS Viya Managed App&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;STRONG&gt;Cluster Type:&lt;/STRONG&gt; Private AKS cluster with restricted egress&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;STRONG&gt;Storage Account Access:&lt;/STRONG&gt; Using Private Endpoint, attempting to allow trusted subnet&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;STRONG&gt;RBAC:&lt;/STRONG&gt; Likely controlled by managed app,&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;HR /&gt;&lt;P&gt;🧾 What I Need Help With:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;STRONG&gt;How can I grant the correct permissions to allow subnet access to the Storage Account&lt;/STRONG&gt; without violating the managed application’s security model?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Is there a &lt;STRONG&gt;Microsoft-approved workaround&lt;/STRONG&gt; for private traffic access in a SAS Viya managed app?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;If anyone successfully added the VNet to the storage account, could you share how you elevated permissions (via Azure RBAC, custom role, etc.)?&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;HR /&gt;&lt;P class=""&gt;Any help or experience shared would be greatly appreciated. Thank you!&lt;/P&gt;&lt;P class=""&gt;&lt;STRONG&gt;– Jagadeesh Kolla&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 09 May 2025 14:14:37 GMT</pubDate>
    <dc:creator>kollajagadeesh</dc:creator>
    <dc:date>2025-05-09T14:14:37Z</dc:date>
    <item>
      <title>Cannot Add VNet/Subnet to Azure Storage Firewall for SAS Viya (AKS) – AuthorizationFail</title>
      <link>https://communities.sas.com/t5/SAS-Viya-on-Microsoft-Azure/Cannot-Add-VNet-Subnet-to-Azure-Storage-Firewall-for-SAS-Viya/m-p/966155#M428</link>
      <description>&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;P class=""&gt;&lt;STRONG&gt;Hello SAS Community,&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;I have deployed&amp;nbsp;&amp;nbsp;&lt;STRONG&gt;SAS Viya 4 on Azure Kubernetes Service (AKS)&lt;/STRONG&gt; using the &lt;STRONG&gt;Microsoft Marketplace managed application&lt;/STRONG&gt;, and I’ve run into some issues with networking and diagnostics while i try to mount the azure storage into SAS viya&amp;nbsp; . I would appreciate any guidance or insight from those who’ve dealt with similar setups.&lt;/P&gt;&lt;HR /&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":exclamation_mark:"&gt;❗&lt;/span&gt; Issue 1: VNet/Subnet Addition to Storage Account Fails&lt;/P&gt;&lt;P class=""&gt;I'm trying to allow private access to the storage account by adding the &lt;CODE&gt;sas-viya-btsm-vnet&lt;/CODE&gt; and its subnet under:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;Azure Portal → Storage Account → Networking → Firewalls and Virtual Networks&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P class=""&gt;But I encounter an error with this message:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P class=""&gt;&lt;SPAN&gt;&amp;nbsp;Failed to enable service endpoints for 1 out of 1 virtual network(s). The client '*************' with object id '9a83f34e-04fb-44ff-9bb1-15f69a6d2532' has permission to perform action 'Microsoft.Network/virtualNetworks/write' on scope '/subscriptions/b13401f4-1d8f-4ae1-ab8a-9ddd1bed0b92/resourceGroups/mrg-sas-viya-on-azure-20250428101250/providers/Microsoft.Network/virtualNetworks/sas-viya-btsm-vnet'; however, it does not have permission to perform action 'Microsoft.Network/networkSecurityGroups/join/action' on the '0' linked scope(s) '' or the linked scope(s) are invalid and is blocked by deny assignments on the '1' linked scope(s) '/subscriptions/b13401f4-1d8f-4ae1-ab8a-9ddd1bed0b92/resourceGroups/mrg-sas-viya-on-azure-20250428101250/providers/Microsoft.Network/networkSecurityGroups/sas-viya-btsm-nsg'.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P class=""&gt;I suspect this is due to RBAC or deny assignments placed by the managed application.&lt;/P&gt;&lt;HR /&gt;&lt;P&gt;🧪 What I've Tried:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P class=""&gt;Confirmed that the AKS cluster is deployed into a private VNet using Azure CNI.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Verified NSG and Azure Firewall rules.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Checked IAM roles assigned to my user and managed identities.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Ran the &lt;CODE&gt;get_k8s_info.sh&lt;/CODE&gt; script (output available).&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Tried using the &lt;STRONG&gt;Azure CLI and Run Command&lt;/STRONG&gt; feature (note: Run Command does not support &lt;CODE&gt;--watch&lt;/CODE&gt; or real-time monitoring).&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;HR /&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":package:"&gt;📦&lt;/span&gt; Environment Details:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;STRONG&gt;SAS Viya Version:&lt;/STRONG&gt;&amp;nbsp;Stable 2025.03&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;STRONG&gt;Deployment Type:&lt;/STRONG&gt; Azure Marketplace – SAS Viya Managed App&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;STRONG&gt;Cluster Type:&lt;/STRONG&gt; Private AKS cluster with restricted egress&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;STRONG&gt;Storage Account Access:&lt;/STRONG&gt; Using Private Endpoint, attempting to allow trusted subnet&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;STRONG&gt;RBAC:&lt;/STRONG&gt; Likely controlled by managed app,&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;HR /&gt;&lt;P&gt;🧾 What I Need Help With:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P class=""&gt;&lt;STRONG&gt;How can I grant the correct permissions to allow subnet access to the Storage Account&lt;/STRONG&gt; without violating the managed application’s security model?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;Is there a &lt;STRONG&gt;Microsoft-approved workaround&lt;/STRONG&gt; for private traffic access in a SAS Viya managed app?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class=""&gt;If anyone successfully added the VNet to the storage account, could you share how you elevated permissions (via Azure RBAC, custom role, etc.)?&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;HR /&gt;&lt;P class=""&gt;Any help or experience shared would be greatly appreciated. Thank you!&lt;/P&gt;&lt;P class=""&gt;&lt;STRONG&gt;– Jagadeesh Kolla&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 09 May 2025 14:14:37 GMT</pubDate>
      <guid>https://communities.sas.com/t5/SAS-Viya-on-Microsoft-Azure/Cannot-Add-VNet-Subnet-to-Azure-Storage-Firewall-for-SAS-Viya/m-p/966155#M428</guid>
      <dc:creator>kollajagadeesh</dc:creator>
      <dc:date>2025-05-09T14:14:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Add VNet/Subnet to Azure Storage Firewall for SAS Viya (AKS) – AuthorizationFail</title>
      <link>https://communities.sas.com/t5/SAS-Viya-on-Microsoft-Azure/Cannot-Add-VNet-Subnet-to-Azure-Storage-Firewall-for-SAS-Viya/m-p/966720#M430</link>
      <description>&lt;P&gt;&lt;a href="https://communities.sas.com/t5/user/viewprofilepage/user-id/475233"&gt;@kollajagadeesh&lt;/a&gt;&amp;nbsp;you're right, the current set of allowed actions do not include&lt;EM&gt;&amp;nbsp;Microsoft.Network/networkSecurityGroups/join/action&lt;/EM&gt; which is required to do what you're looking to do.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am going to check with a couple of colleagues what we think the best course of action should be.&lt;/P&gt;</description>
      <pubDate>Fri, 16 May 2025 18:32:34 GMT</pubDate>
      <guid>https://communities.sas.com/t5/SAS-Viya-on-Microsoft-Azure/Cannot-Add-VNet-Subnet-to-Azure-Storage-Firewall-for-SAS-Viya/m-p/966720#M430</guid>
      <dc:creator>cj_blake</dc:creator>
      <dc:date>2025-05-16T18:32:34Z</dc:date>
    </item>
  </channel>
</rss>

