I cannot remove Resource Group and its resources due to system defined RBAC deny assignments

Mika Seitsonen 0 Reputation points
2025-02-26T15:27:17.26+00:00

I have created an Automatic Azure Kubernetes Cluster with managed Prometheus monitoring and Managed Grafana instance for visualization. When I remove Resource Group in which cluster resource resides, the automatically created Resource Group with Azure managed resources, e.g. Virtual Machine Scale Set named MC_, is also removed. However, automatically created Resource Group MA_ for Prometheus Azure Monitor Workspace with its resources is not removed. Even with Owner role, I cannot remove Resource Group nor its resources manually because of System Defined Deny Assignments "Azure Monitor Workspace Managed Resource Group Deny-

Azure Role-based access control
Azure Role-based access control
An Azure service that provides fine-grained access management for Azure resources, enabling you to grant users only the rights they need to perform their jobs.
883 questions
Azure Kubernetes Service (AKS)
Azure Kubernetes Service (AKS)
An Azure service that provides serverless Kubernetes, an integrated continuous integration and continuous delivery experience, and enterprise-grade security and governance.
2,293 questions
0 comments No comments
{count} votes

2 answers

Sort by: Most helpful
  1. Deleted

    This answer has been deleted due to a violation of our Code of Conduct. The answer was manually reported or identified through automated detection before action was taken. Please refer to our Code of Conduct for more information.


    Comments have been turned off. Learn more

  2. Nikhil Duserla 4,750 Reputation points Microsoft Vendor
    2025-02-26T21:02:08.4433333+00:00

    Hi @Mika Seitsonen,

    Welcome to the Microsoft Q&A Platform! Thank you for asking your question here.

    I have tried the same scenario in my lab by creating an AKS cluster along with Prometheus monitoring and Managed Grafana. I was able to delete the resource group without any automatic recreation of another resource group.

    Deny assignments block users from performing specific actions even if a role assignment grants them access. At this time, the only way you can add your own deny assignments is by using Deployment Stacks.

    User's image

    Check any Deny assignments are block users from performing specific actions. Please follow this document to make changes https://learn.microsoft.com/en-us/azure/role-based-access-control/deny-assignments?tabs=azure-portal#list-deny-assignments-in-the-azure-portal and retry deleted the Resource Group.

    If you have any further queries, do let us know.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.