You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-arc/kubernetes/tutorial-akv-secrets-provider.md
+13-11Lines changed: 13 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Use Azure Key Vault Secrets Provider extension to fetch secrets into Azure Arc-enabled Kubernetes clusters
3
3
description: Learn how to set up the Azure Key Vault Provider for Secrets Store CSI Driver interface as an extension on Azure Arc enabled Kubernetes cluster
4
4
ms.custom: ignite-2022
5
-
ms.date: 10/12/2022
5
+
ms.date: 03/03/2023
6
6
ms.topic: tutorial
7
7
author: mayurigupta13
8
8
ms.author: mayg
@@ -56,7 +56,7 @@ You can install the Azure Key Vault Secrets Provider extension on your connected
56
56
57
57
[](media/tutorial-akv-secrets-provider/extension-install-new-resource.jpg)
58
58
59
-
1. Follow the prompts to deploy the extension. If needed, you can customize the installation by changing the default options on the **Configuration** tab.
59
+
1. Follow the prompts to deploy the extension. If needed, customize the installation by changing the default options on the **Configuration** tab.
60
60
61
61
### Azure CLI
62
62
@@ -67,7 +67,7 @@ You can install the Azure Key Vault Secrets Provider extension on your connected
67
67
export RESOURCE_GROUP=<resource-group-name>
68
68
```
69
69
70
-
2. Install the Secrets Store CSI Driver and the Azure Key Vault Secrets Provider extension by running the following command:
70
+
2. Install the Secrets Store CSI Driver and the Azure Key Vault Secrets Provider extension by running the following command:
@@ -251,14 +251,14 @@ You should see output similar to the example below.
251
251
252
252
Next, specify the Azure Key Vault to use with your connected cluster. If you don't already have one, create a new Key Vault by using the following commands. Keep in mind that the name of your Key Vault must be globally unique.
253
253
254
-
255
254
Set the following environment variables:
256
255
257
256
```azurecli-interactive
258
257
export AKV_RESOURCE_GROUP=<resource-group-name>
259
258
export AZUREKEYVAULT_NAME=<AKV-name>
260
259
export AZUREKEYVAULT_LOCATION=<AKV-location>
261
260
```
261
+
262
262
Next, run the following command
263
263
264
264
```azurecli
@@ -282,9 +282,9 @@ Before you move on to the next section, take note of the following properties:
282
282
283
283
Currently, the Secrets Store CSI Driver on Arc-enabled clusters can be accessed through a service principal. Follow the steps below to provide an identity that can access your Key Vault.
284
284
285
-
1. Follow the steps [here](../../active-directory/develop/howto-create-service-principal-portal.md#register-an-application-with-azure-ad-and-create-a-service-principal) to create a service principal in Azure. Take note of the Client ID and Client Secret generated in this step.
286
-
1. Provide Azure Key Vault GET permission to the created service principal by following the steps[here](../../key-vault/general/assign-access-policy.md).
287
-
1. Use the client ID and Client Secret from step 1 to create a Kubernetes secret on the Arc connected cluster:
285
+
1. Follow the steps [to create a service principal in Azure](../../active-directory/develop/howto-create-service-principal-portal.md#register-an-application-with-azure-ad-and-create-a-service-principal). Take note of the Client ID and Client Secret generated in this step.
286
+
1. Provide Azure Key Vault GET permission to the created service principal by [following these steps](../../key-vault/general/assign-access-policy.md).
287
+
1. Use the client ID and Client Secret from the first step to create a Kubernetes secret on the connected cluster:
The following configuration settings are available for the Azure Key Vault Secrets Provider extension:
377
+
The Azure Key Vault Secrets Provider extension supports the various [Helm chart configurations[(https://github.com/Azure/secrets-store-csi-driver-provider-azure/blob/master/charts/csi-secrets-store-provider-azure/README.md#configuration)].
378
+
379
+
The following configuration settings are frequently used with the Azure Key Vault Secrets Provider extension:
378
380
379
381
| Configuration Setting | Default | Description |
380
382
| --------- | ----------- | ----------- |
381
383
| enableSecretRotation | false | Boolean type. If `true`, periodically updates the pod mount and Kubernetes Secret with the latest content from external secrets store |
382
-
| rotationPollInterval | 2m |Specifies the secret rotation poll interval duration if `enableSecretRotation` is `true`. This duration can be adjusted based on how frequently the mounted contents for all pods and Kubernetes secrets need to be resynced to the latest. |
384
+
| rotationPollInterval | 2m |If `enableSecretRotation` is `true`, specifies the secret rotation poll interval duration. This duration can be adjusted based on how frequently the mounted contents for all pods and Kubernetes secrets need to be re-synced to the latest. |
383
385
| syncSecret.enabled | false | Boolean input. In some cases, you may want to create a Kubernetes Secret to mirror the mounted content. If `true`, `SecretProviderClass` allows the `secretObjects` field to define the desired state of the synced Kubernetes Secret objects. |
384
386
385
387
These settings can be specified when the extension is installed by using the `az k8s-extension create` command:
@@ -388,7 +390,7 @@ These settings can be specified when the extension is installed by using the `az
@@ -415,7 +417,7 @@ If the extension was successfully removed, you won't see the the Azure Key Vault
415
417
416
418
## Reconciliation and troubleshooting
417
419
418
-
The Azure Key Vault Secrets Provider extension is self-healing. If somebody tries to change or delete an extension component that was deployed when the extension was installed, that component will be reconciled to its original state. The only exceptions are for Custom Resource Definitions (CRDs). If CRDs are deleted, they won't be reconciled. To restore deleted CRDs, use the `az k8s-exstension create` command again with the existing extension instance name.
420
+
The Azure Key Vault Secrets Provider extension is self-healing. If somebody tries to change or delete an extension component that was deployed when the extension was installed, that component will be reconciled to its original state. The only exceptions are for Custom Resource Definitions (CRDs). If CRDs are deleted, they won't be reconciled. To restore deleted CRDs, use the `az k8s-extension create` command again with the existing extension instance name.
419
421
420
422
For more information about resolving common issues, see the open source troubleshooting guides for [Azure Key Vault provider for Secrets Store CSI driver](https://azure.github.io/secrets-store-csi-driver-provider-azure/docs/troubleshooting/) and [Secrets Store CSI Driver](https://secrets-store-csi-driver.sigs.k8s.io/troubleshooting.html).
0 commit comments