Skip to content

Commit a0540c6

Browse files
author
Gage Hugo
committed
Update secretArchiveReference with new API fields, fix acrolinx
1 parent 9fa167b commit a0540c6

File tree

1 file changed

+10
-5
lines changed

1 file changed

+10
-5
lines changed

articles/operator-nexus/howto-credential-rotation.md

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -37,9 +37,9 @@ The Operator Nexus Platform offers a managed credential rotation process that au
3737
When a new Cluster is created, the credentials are automatically rotated during deployment. The managed credential process then automatically rotates these credentials periodically based on the credential type. The updated credentials are written to the key vault associated with the Cluster resource.
3838

3939
> [!NOTE]
40-
> The introduction of this capability enables auto-rotation for existing instances. If any of the supported credentials haven't rotated within the expected rotation time period, they'll rotate during the management upgrade.
40+
> The introduction of this capability enables auto rotation for existing instances. Rotation occurs during the management upgrade if any of the supported credentials are due for rotation within the expected rotation time period.
4141
42-
With the 2024-07-01-GA API, the credential rotation status is available on the Bare Metal Machine or Storage Appliance resources in the `secretRotationStatus` data construct for each of the rotated credentials.
42+
The 2024-07-01-GA version of the Network Cloud API added the credential rotation status on the Bare Metal Machine and Storage Appliance resources. This information can be found in the secretRotationStatus data construct for each of the rotated credentials. The 2025-07-01-preview & subsequent versions of the API adds the keyVaultUri to this data construct to indicate which Key Vault contains the rotated secret.
4343

4444
One example of this `secretRotationStatus` looks like:
4545
```
@@ -48,6 +48,7 @@ One example of this `secretRotationStatus` looks like:
4848
"lastRotationTime": "2024-10-30T17:48:23Z",
4949
"rotationPeriodDays": 14,
5050
"secretArchiveReference": {
51+
"keyVaultUri": "<KV URI>:,
5152
"keyVaultId": "<KV Resource ID>",
5253
"secretName": "YYYYYYYYYYYYYYYYYYYYYY-storage-appliance-credential-manager-ZZZZZZZ",
5354
"secretVersion": "XXXXXXXXXXXXXX"
@@ -60,7 +61,11 @@ In the `secretRotationStatus` object, the following fields provide context to th
6061

6162
- `lastRotationTime`: The timestamp in UTC of the previous successful rotation.
6263
- `rotationPeriodDays`: The number in days the Credential Manager service is scheduled to rotate this credential. This value isn't remaining days from the `lastRotatedTime` since rotation can be delayed, but how many days on a schedule the service rotates a particular credential.
63-
- `secretArchiveReference`: A reference to the Key Vault that the credential is stored. It contains the ID of the key vault, the secret name of the stored credential, and the version of the secret that was previously rotated.
64+
- `secretArchiveReference`: A reference to the Key Vault that the credential is stored. It contains:
65+
- the URI of the key vault
66+
- the ID of the key vault
67+
- the secret name of the stored credential
68+
- the version of the secret that was previously rotated
6469

6570
>[!CAUTION]
6671
> If a credential is changed on a device outside of the automatic credential rotation service, the next rotation will likely fail due to the secret not being known by the software. This issue prevents further automated rotation.
@@ -77,8 +82,8 @@ The unknown state of credentials to the platform impacts monitoring and the abil
7782

7883
In order to restore the state of the credential, it must be reset to a value that the platform recognizes. There are two options for this situation:
7984

80-
1. Run a [BareMetalMachine replace](./howto-baremetal-functions.md) action providing the current active credentials. The replace action allows the machine to use provided credentials to reset credential rotation. This is the recommended option if significant changes are made to the machine.
81-
1. Reset the BMC credential back to the value prior to the manual change. If a key vault is configured for receiving rotated credential, then the proper value may be obtained using information from the `secretRotationStatus` data for the Bare Metal Machine resource. The rotation status for the BMC Credential indicates the secret key and version within the key vault for the appropriate value. Once the credential is set to match the value expected by the credential rotation system, rotation will proceed normally.
85+
1. Run a [BareMetalMachine replace](./howto-baremetal-functions.md) action providing the current active credentials. The replace action allows the machine to use provided credentials to reset credential rotation. This action is the recommended option if significant changes are made to the machine.
86+
1. Reset the BMC credential back to the value before the manual change. If a key vault is configured for receiving rotated credential, then the proper value can be obtained using information from the `secretRotationStatus` data for the Bare Metal Machine resource. The rotation status for the BMC Credential indicates the secret key and version within the key vault for the appropriate value. Once the credential is set to match the value expected by the credential rotation system, rotation occurs normally.
8287

8388
Example `secretRotationStatus` for BMC credential. Use the `secretName` and `secretVersion` to find the proper value in the cluster key vault.
8489
```

0 commit comments

Comments
 (0)