@@ -34,7 +34,7 @@ The Key Vault VM extension supports these Linux distributions:
34
34
35
35
Version 3.0+ of the Key Vault VM extension for Linux adds support for the following features:
36
36
37
- - Add ACL permissions for downloaded certificates
37
+ - Add ACL permissions for downloaded certificates to provide read access for users and groups
38
38
- Certificate installation location configuration
39
39
- Custom symbolic name support
40
40
- VM extension logging integration support through [ Fluentd] ( https://www.fluentd.org/ )
@@ -99,12 +99,13 @@ The following JSON shows the schema for the Key Vault VM extension. The extensio
99
99
"autoUpgradeMinorVersion" : true ,
100
100
"enableAutomaticUpgrade" : true ,
101
101
"settings" : {
102
- "loggingSettings" : {
102
+ "loggingSettings" : <Optional logging settings, e.g.:
103
+ {
103
104
"logger" : <Logger engine name. e.g.: "fluentd">,
104
- "endpoint" : <Logger listening endpoint "unix :///var/run/azuremonitoragent/sometenant/default_fluent.socket ">,
105
+ "endpoint" : <Logger listening endpoint "tcp ://localhost:24224 ">,
105
106
"format" : <Logging format. e.g.: "forward">,
106
107
"servicename" : <Service name used in logs. e.g.: "akvvm_service">
107
- },
108
+ }> ,
108
109
"secretsManagementSettings" : {
109
110
"pollingIntervalInS" : <polling interval in seconds, e.g. "3600">,
110
111
"linkOnRenewal" : <Not available on Linux e.g.: false>,
@@ -137,10 +138,11 @@ The following JSON shows the schema for the Key Vault VM extension. The extensio
137
138
}
138
139
]>
139
140
},
140
- "authenticationSettings" : {
141
+ "authenticationSettings" : <Optional msi settings, e.g.:
142
+ {
141
143
"msiEndpoint" : <Required when msiClientId is provided. MSI endpoint e.g. for most Azure VMs: "http://169.254.169.254/metadata/identity">,
142
144
"msiClientId" : <Required when VM has any user assigned identities. MSI identity e.g.: "c7373ae5-91c2-4165-8ab6-7381d6e75619".>
143
- }
145
+ }>
144
146
}
145
147
}
146
148
}
@@ -201,44 +203,47 @@ The following JSON shows the schema for the Key Vault VM extension. The extensio
201
203
202
204
| Name | Value / Example | Data Type |
203
205
| ---- | ---- | ---- |
204
- | apiVersion | 2022-07-01 | date |
205
- | publisher | Microsoft.Azure.KeyVault | string |
206
- | type | KeyVaultForLinux | string |
207
- | typeHandlerVersion | 3.0 | int |
208
- | pollingIntervalInS | 3600 | string |
209
- | certificateStoreName | It's ignored on Linux | string |
210
- | linkOnRenewal | false | boolean |
211
- | requireInitialSync | true | boolean |
212
- | certificateStoreLocation | /var/lib/waagent/Microsoft.Azure.KeyVault.Store | string |
213
- | observedCertificates | [ {...}, {...}] | string array |
214
- | observedCertificates/url | "https://myvault.vault.azure.net/secrets/mycertificate1" | string |
215
- | observedCertificates/certificateStoreLocation | "/var/lib/waagent/Microsoft.Azure.KeyVault/app1" | string |
216
- | observedCertificates/customSymbolicLinkName | "app1Cert1" | string |
217
- | observedCertificates/acls | "{...}, {...}" | string array |
218
- | msiEndpoint | http://169.254.169.254/metadata/identity | string |
219
- | msiClientId | c7373ae5-91c2-4165-8ab6-7381d6e75619 | string |
220
- | logger | "fluentd" | string |
221
- | endpoint | "unix:///var/run/azuremonitoragent/sometenant/default_fluent.socket" | string |
222
- | format | "forward" | string |
223
- | servicename | "akvvm_service" | string |
206
+ | ` apiVersion ` | 2022-07-01 | date |
207
+ | ` publisher ` | Microsoft.Azure.KeyVault | string |
208
+ | ` type ` | KeyVaultForLinux | string |
209
+ | ` typeHandlerVersion ` | 3.0 | int |
210
+ | ` pollingIntervalInS ` | 3600 | string |
211
+ | ` certificateStoreName ` | It's ignored on Linux | string |
212
+ | ` linkOnRenewal ` | false | boolean |
213
+ | ` requireInitialSync ` | true | boolean |
214
+ | ` aclEnabled ` | true | boolean |
215
+ | ` certificateStoreLocation ` | /var/lib/waagent/Microsoft.Azure.KeyVault.Store | string |
216
+ | ` observedCertificates ` | [ {...}, {...}] | string array |
217
+ | ` observedCertificates/url ` | "https://myvault.vault.azure.net/secrets/mycertificate1" | string |
218
+ | ` observedCertificates/certificateStoreLocation ` | "/var/lib/waagent/Microsoft.Azure.KeyVault/app1" | string |
219
+ | ` observedCertificates/customSymbolicLinkName ` (optional) | "app1Cert1" | string |
220
+ | ` observedCertificates/acls ` (optional) | "{...}, {...}" | string array |
221
+ | ` authenticationSettings ` (optional) | {...} | object |
222
+ | ` authenticationSettings/msiEndpoint ` | http://169.254.169.254/metadata/identity | string |
223
+ | ` authenticationSettings/msiClientId ` | c7373ae5-91c2-4165-8ab6-7381d6e75619 | string |
224
+ | ` loggingSettings ` (optional) | {...} | object |
225
+ | ` loggingSettings/logger ` | "fluentd" | string |
226
+ | ` loggingSettings/endpoint ` | "tcp://localhost:24224" | string |
227
+ | ` loggingSettings/format ` | "forward" | string |
228
+ | ` loggingSettings/servicename ` | "akvvm_service" | string |
224
229
225
230
226
231
#### [ Version-1.0/2.0] ( #tab/version12 )
227
232
228
233
| Name | Value / Example | Data Type |
229
234
| ---- | ---- | ---- |
230
- | apiVersion | 2022-07-01 | date |
231
- | publisher | Microsoft.Azure.KeyVault | string |
232
- | type | KeyVaultForLinux | string |
233
- | typeHandlerVersion | 2.0 | int |
234
- | pollingIntervalInS | 3600 | string |
235
- | certificateStoreName | It's ignored on Linux | string |
236
- | linkOnRenewal | false | boolean |
237
- | certificateStoreLocation | /var/lib/waagent/Microsoft.Azure.KeyVault.Store | string |
238
- | requireInitialSync | true | boolean |
239
- | observedCertificates | [ "https://myvault.vault.azure.net/secrets/mycertificate ", "https://myvault.vault.azure.net/secrets/mycertificate2 "] | string array
240
- | msiEndpoint | http://169.254.169.254/metadata/identity | string |
241
- | msiClientId | c7373ae5-91c2-4165-8ab6-7381d6e75619 | string |
235
+ | ` apiVersion ` | 2022-07-01 | date |
236
+ | ` publisher ` | Microsoft.Azure.KeyVault | string |
237
+ | ` type ` | KeyVaultForLinux | string |
238
+ | ` typeHandlerVersion ` | 2.0 | int |
239
+ | ` pollingIntervalInS ` | 3600 | string |
240
+ | ` certificateStoreName ` | It's ignored on Linux | string |
241
+ | ` linkOnRenewal ` | false | boolean |
242
+ | ` certificateStoreLocation ` | /var/lib/waagent/Microsoft.Azure.KeyVault.Store | string |
243
+ | ` requireInitialSync ` | true | boolean |
244
+ | ` observedCertificates ` | [ "https://myvault.vault.azure.net/secrets/mycertificate ", "https://myvault.vault.azure.net/secrets/mycertificate2 "] | string array
245
+ | ` msiEndpoint ` | http://169.254.169.254/metadata/identity | string |
246
+ | ` msiClientId ` | c7373ae5-91c2-4165-8ab6-7381d6e75619 | string |
242
247
243
248
---
244
249
@@ -270,15 +275,10 @@ The JSON configuration for a virtual machine extension must be nested inside the
270
275
"autoUpgradeMinorVersion" : true ,
271
276
"enableAutomaticUpgrade" : true ,
272
277
"settings" : {
273
- "loggingSettings" : {
274
- "logger" : <Logger engine name. e.g.: "fluentd">,
275
- "endpoint" : <Logger listening endpoint "unix:///var/run/azuremonitoragent/sometenant/default_fluent.socket">,
276
- "format" : <Logging format. e.g.: "forward">,
277
- "servicename" : <Service name used in logs. e.g.: "akvvm_service">
278
- },
279
278
"secretsManagementSettings" : {
280
279
"pollingIntervalInS" : <polling interval in seconds, e.g. "3600">,
281
280
"requireInitialSync" : <initial synchronization of certificates e..g: false>,
281
+ "aclEnabled" : <enables/disables acls on defined certificates e.g.: true>,
282
282
"observedCertificates" : <An array of KeyVault URIs that represent monitored certificates, including certificate store location and ACL permission to certificate private key. Example:
283
283
[
284
284
{
@@ -383,15 +383,10 @@ The following JSON snippets provide example settings for deploying the Key Vault
383
383
384
384
``` json
385
385
{
386
- "loggingSettings" : {
387
- "logger" : " fluentd" ,
388
- "endpoint" : " unix:///var/run/azuremonitoragent/sometenant/default_fluent.socket" ,
389
- "format" : " forward" ,
390
- "servicename" : " akvvm_service"
391
- },
392
386
"secretsManagementSettings" : {
393
387
"pollingIntervalInS" : " 3600" ,
394
388
"linkOnRenewal" : true ,
389
+ "aclEnabled" : true ,
395
390
"observedCertificates" :
396
391
[
397
392
{
@@ -513,15 +508,10 @@ The following JSON snippets provide example settings for deploying the Key Vault
513
508
514
509
``` json
515
510
{
516
- "loggingSettings" : {
517
- "logger" : " fluentd" ,
518
- "endpoint" : " unix:///var/run/azuremonitoragent/sometenant/default_fluent.socket" ,
519
- "format" : " forward" ,
520
- "servicename" : " akvvm_service"
521
- },
522
511
"secretsManagementSettings" : {
523
512
"pollingIntervalInS" : " 3600" ,
524
513
"linkOnRenewal" : true ,
514
+ "aclEnabled" : true ,
525
515
"observedCertificates" :
526
516
[
527
517
{
@@ -637,7 +627,7 @@ Get-AzVMExtension -VMName <vmName> -ResourceGroupname <resource group name>
637
627
638
628
### Logs and configuration
639
629
640
- The Key Vault VM extension logs exist locally on the VM and are most informative when it comes to troubleshooting.
630
+ The Key Vault VM extension logs exist locally on the VM and are most informative when it comes to troubleshooting. You can use optional logging section to integrate with logging provider through ` fluentd `
641
631
642
632
| Location| Description|
643
633
| --| --|
@@ -655,7 +645,6 @@ Symbolic links or Symlinks are advanced shortcuts. To avoid monitoring the folde
655
645
* Is there's a limit on the number of observedCertificates you can configure?
656
646
No, Key Vault VM Extension doesn’t have limit on the number of observedCertificates.
657
647
658
-
659
648
### Support
660
649
661
650
If you need more help at any point in this article, you can contact the Azure experts on the [ MSDN Azure and Stack Overflow forums] ( https://azure.microsoft.com/support/forums/ ) . Alternatively, you can file an Azure support incident. Go to the [ Azure support site] ( https://azure.microsoft.com/support/options/ ) and select Get support. For information about using Azure Support, read the [ Microsoft Azure support FAQ] ( https://azure.microsoft.com/support/faq/ ) .
0 commit comments