Skip to content

Commit 56e9900

Browse files
author
David Curwin
committed
update jan 16 a
1 parent d97b14e commit 56e9900

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

articles/defender-for-cloud/defender-for-containers-architecture.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ When you enable the agentless discovery for Kubernetes extension, the following
7777
Learn more about [AKS Trusted Access](/azure/aks/trusted-access-feature).
7878

7979
- **Discover**: Using the system assigned identity, Defender for Cloud performs a discovery of the AKS clusters in your environment using API calls to the API server of AKS.
80-
- **Bind**: Upon discovery of an AKS cluster, Defender for Cloud performs an AKS bind operation between the created identity and the Kubernetes role Microsoft.Security/pricings/microsoft-defender-operator. The role is visible via API and gives Defender for Cloud data plane read permission inside the cluster.
80+
- **Bind**: Upon discovery of an AKS cluster, Defender for Cloud performs an AKS bind operation between the created identity and the Kubernetes role *Microsoft.Security/pricings/microsoft-defender-operator*. The role is visible via API and gives Defender for Cloud data plane read permission inside the cluster.
8181

8282
## [**On-premises / IaaS (Arc)**](#tab/defender-for-container-arch-arc)
8383

@@ -119,7 +119,7 @@ The discovery process is based on snapshots taken at intervals:
119119
When you enable the agentless discovery for Kubernetes extension, the following process occurs:
120120

121121
- **Create**:
122-
- The Defender for Cloud role *MDCContainersAgentlessDiscoveryK8sRole* is created to the *aws-auth ConfigMap* of the EKS clusters by default, and can be customized.
122+
- The Defender for Cloud role *MDCContainersAgentlessDiscoveryK8sRole* must be added to the *aws-auth ConfigMap* of the EKS clusters. The name can be customized.
123123

124124
- **Assign**: Defender for Cloud assigns the *MDCContainersAgentlessDiscoveryK8sRole* role the following permissions:
125125

0 commit comments

Comments
 (0)