Permissions for @turbot/azure-aks

Taking a look at permissions and associated grant levels for each permission for AKS:

PermissionGrant LevelHelp
microsoft.containerservice/containerservices/readmetadataGet Container Service
microsoft.containerservice/containerservices/writeadminCreate or Update Container Service
microsoft.containerservice/containerservices/deleteadminDelete Container Service
microsoft.containerservice/managedclusters/readmetadataGet Managed Cluster
microsoft.containerservice/managedclusters/writeadminCreate or Update Managed Cluster
microsoft.containerservice/managedclusters/deleteadminDelete Managed Cluster
microsoft.containerservice/managedclusters/listclusteradmincredential/actionadminList clusterAdmin credential
microsoft.containerservice/managedclusters/listclusterusercredential/actionadminList clusterUser credential
microsoft.containerservice/managedclusters/resetserviceprincipalprofile/actionadminReset service principal profile
microsoft.containerservice/managedclusters/resetaadprofile/actionadminReset AAD profile
microsoft.containerservice/managedclusters/privateendpointconnectionsapproval/actionadminApprove Private Endpoint Connections
microsoft.containerservice/managedclusters/providers/microsoft.insights/diagnosticsettings/readmetadataRead Diagnostic Setting
microsoft.containerservice/managedclusters/providers/microsoft.insights/diagnosticsettings/writeadminWrite Diagnostic Setting
microsoft.containerservice/managedclusters/providers/microsoft.insights/metricdefinitions/readmetadataRead Managed Cluster metric definitions
microsoft.containerservice/managedclusters/accessprofiles/readmetadataGet Managed Cluster AccessProfile
microsoft.containerservice/managedclusters/accessprofiles/listcredential/actionadminGet Managed Cluster AccessProfile by List Credential
microsoft.containerservice/managedclusters/providers/microsoft.insights/logdefinitions/readmetadataRead Managed Cluster log definitions
microsoft.containerservice/locations/operations/readmetadataGet Operation
microsoft.containerservice/locations/orchestrators/readmetadataList Orchestrators
microsoft.containerservice/managedclusters/upgradeprofiles/readmetadataGet UpgradeProfile
microsoft.containerservice/operations/readmetadataList Available Container Service Operations
microsoft.containerservice/locations/operationresults/readmetadataGet Operation Result
microsoft.containerservice/openshiftmanagedclusters/readmetadataGet Open Shift Managed Cluster
microsoft.containerservice/openshiftmanagedclusters/writeadminCreate or Update Open Shift Managed Cluster
microsoft.containerservice/openshiftmanagedclusters/deleteadminDelete Open Shift Managed Cluster
microsoft.containerservice/openshiftclusters/readmetadataGet Open Shift Cluster
microsoft.containerservice/openshiftclusters/writeadminCreate or Update Open Shift Cluster
microsoft.containerservice/openshiftclusters/deleteadminDelete Open Shift Cluster
microsoft.containerservice/managedclusters/agentpools/readmetadataGet Agent Pool
microsoft.containerservice/managedclusters/agentpools/writeadminCreate or Update Agent Pool
microsoft.containerservice/managedclusters/agentpools/deleteadminDelete Agent Pool
microsoft.containerservice/managedclusters/detectors/readmetadataGet Managed Cluster Detector
microsoft.containerservice/managedclusters/agentpools/upgradeProfiles/readmetadataGet Agent Pool UpgradeProfile
microsoft.containerservice/managedclusters/listclustermonitoringusercredential/actionadminlist clustermonitoringuser credential
microsoft.containerservice/managedclusters/rotateclustercertificates/actionadminrotate certificates of the cluster
microsoft.containerservice/managedclusters/diagnosticsstate/readmetadataget diagnostics state
microsoft.containerservice/managedclusters/availableagentpoolversions/readmetadataget available agent pool versions
microsoft.containerservice/register/actionadminregister subscription for container service
microsoft.containerservice/unregister/actionadminunregister subscription for container service
microsoft.resources/deployments/cancel/actionadminadmin level is safe as users still need the service specific write/delete permissions to deploy resources.
microsoft.resources/deployments/deleteadminadmin level is safe as users still need the service specific write/delete permissions to deploy resources.
microsoft.resources/deployments/operations/readmetadata
microsoft.resources/deployments/readmetadata
microsoft.resources/deployments/validate/actionadmin
microsoft.resources/deployments/writeadminadmin level is safe as users still need the service specific write permissions to deploy resources.
microsoft.resources/subscriptions/resourcegroups/readmetadata