Skip to content

Commit 117730b

Browse files
Merge pull request #113636 from jluk/dep-flexvol
remove flexvol for csi driver
2 parents 829ce01 + 6e08db8 commit 117730b

File tree

2 files changed

+11
-12
lines changed

2 files changed

+11
-12
lines changed

articles/aks/developer-best-practices-pod-security.md

Lines changed: 11 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
---
2-
title: Pod security best practices
3-
titleSuffix: Azure Kubernetes Service
2+
title: Developer best practices - Pod security in Azure Kubernetes Services (AKS)
43
description: Learn the developer best practices for how to secure pods in Azure Kubernetes Service (AKS)
54
services: container-service
65
author: zr-msft
@@ -70,7 +69,7 @@ To limit the risk of credentials being exposed in your application code, avoid t
7069
The following [associated AKS open source projects][aks-associated-projects] let you automatically authenticate pods or request credentials and keys from a digital vault:
7170
7271
* Managed identities for Azure resources, and
73-
* Azure Key Vault FlexVol driver
72+
* [Azure Key Vault Provider for Secrets Store CSI Driver](https://github.com/Azure/secrets-store-csi-driver-provider-azure#usage)
7473
7574
Associated AKS open source projects are not supported by Azure technical support. They are provided to gather feedback and bugs from our community. These projects are not recommended for production use.
7675
@@ -84,28 +83,28 @@ With a managed identity, your application code doesn't need to include credentia
8483
8584
For more information about pod identities, see [Configure an AKS cluster to use pod managed identities and with your applications][aad-pod-identity]
8685
87-
### Use Azure Key Vault with FlexVol
86+
### Use Azure Key Vault with Secrets Store CSI Driver
8887
89-
Managed pod identities work great to authenticate against supporting Azure services. For your own services or applications without managed identities for Azure resources, you still authenticate using credentials or keys. A digital vault can be used to store these credentials.
88+
Using the pod identity project enables authentication against supporting Azure services. For your own services or applications without managed identities for Azure resources, you can still authenticate using credentials or keys. A digital vault can be used to store these secret contents.
9089
91-
When applications need a credential, they communicate with the digital vault, retrieve the latest credentials, and then connect to the required service. Azure Key Vault can be this digital vault. The simplified workflow for retrieving a credential from Azure Key Vault using pod managed identities is shown in the following diagram:
90+
When applications need a credential, they communicate with the digital vault, retrieve the latest secret contents, and then connect to the required service. Azure Key Vault can be this digital vault. The simplified workflow for retrieving a credential from Azure Key Vault using pod managed identities is shown in the following diagram:
9291
93-
![Simplified workflow for retrieving a credential from Key Vault using a pod managed identity](media/developer-best-practices-pod-security/basic-key-vault-flexvol.png)
92+
![Simplified workflow for retrieving a credential from Key Vault using a pod managed identity](media/developer-best-practices-pod-security/basic-key-vault.png)
9493
95-
With Key Vault, you store and regularly rotate secrets such as credentials, storage account keys, or certificates. You can integrate Azure Key Vault with an AKS cluster using a FlexVolume. The FlexVolume driver lets the AKS cluster natively retrieve credentials from Key Vault and securely provide them only to the requesting pod. Work with your cluster operator to deploy the Key Vault FlexVol driver onto the AKS nodes. You can use a pod managed identity to request access to Key Vault and retrieve the credentials you need through the FlexVolume driver.
94+
With Key Vault, you store and regularly rotate secrets such as credentials, storage account keys, or certificates. You can integrate Azure Key Vault with an AKS cluster using the [Azure Key Vault provider for the Secrets Store CSI Driver](https://github.com/Azure/secrets-store-csi-driver-provider-azure#usage). The Secrets Store CSI driver enables the AKS cluster to natively retrieve secret contents from Key Vault and securely provide them only to the requesting pod. Work with your cluster operator to deploy the Secrets Store CSI Driver onto AKS worker nodes. You can use a pod managed identity to request access to Key Vault and retrieve the secret contents needed through the Secrets Store CSI Driver.
9695
97-
Azure Key Vault with FlexVol is intended for use with applications and services running on Linux pods and nodes.
96+
Azure Key Vault with Secrets Store CSI Driver can be used for Linux nodes and pods which require a Kubernetes version of 1.16 or greater. For Windows nodes and pods a Kubernetes version of 1.18 or greater is required.
9897
9998
## Next steps
10099
101100
This article focused on how to secure your pods. To implement some of these areas, see the following articles:
102101
103102
* [Use managed identities for Azure resources with AKS][aad-pod-identity]
104-
* [Integrate Azure Key Vault with AKS][aks-keyvault-flexvol]
103+
* [Integrate Azure Key Vault with AKS][aks-keyvault-csi-driver]
105104
106105
<!-- EXTERNAL LINKS -->
107106
[aad-pod-identity]: https://github.com/Azure/aad-pod-identity#demo
108-
[aks-keyvault-flexvol]: https://github.com/Azure/kubernetes-keyvault-flexvol
107+
[aks-keyvault-csi-driver]: https://github.com/Azure/secrets-store-csi-driver-provider-azure#usage
109108
[linux-capabilities]: http://man7.org/linux/man-pages/man7/capabilities.7.html
110109
[selinux-labels]: https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.12/#selinuxoptions-v1-core
111110
[aks-associated-projects]: https://github.com/Azure/AKS/blob/master/previews.md#associated-projects
@@ -114,4 +113,4 @@ This article focused on how to secure your pods. To implement some of these area
114113
[best-practices-cluster-security]: operator-best-practices-cluster-security.md
115114
[best-practices-container-image-management]: operator-best-practices-container-image-management.md
116115
[aks-pod-identities]: operator-best-practices-identity.md#use-pod-identities
117-
[apparmor-seccomp]: operator-best-practices-cluster-security.md#secure-container-access-to-resources
116+
[apparmor-seccomp]: operator-best-practices-cluster-security.md#secure-container-access-to-resources

0 commit comments

Comments
 (0)