You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-app-configuration/reference-kubernetes-provider.md
+30-29Lines changed: 30 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -90,7 +90,7 @@ The `spec.keyValues.keyVaults` property has the following child properties.
90
90
|---|---|---|---|
91
91
|target|The destination of the retrieved secrets in Kubernetes|true|object|
92
92
|auth|The authentication method to access Key Vaults|false|object|
93
-
|refresh|The settings for refreshing data from Key Vaults. If the property is absent, data from Key Vaults will not be refreshed|false|object|
93
+
|refresh|The settings for refreshing data from Key Vaults. If the property is absent, data from Key Vaults will not be refreshed unless the corresponding Key Vault references are reloaded|false|object|
94
94
95
95
The `spec.keyValues.keyVaults.target` property has the following child property.
96
96
@@ -293,9 +293,11 @@ spec:
293
293
trimKeyPrefixes: [prefix1, prefix2]
294
294
```
295
295
296
-
### Key Vault references
296
+
### Dynamic configuration refresh
297
297
298
-
The following sample instructs using a service principal to authenticate with a specific vault and a user-assigned managed identity for all other vaults.
298
+
Setting the `spec.keyValues.refresh` property enables dynamic configuration data refresh in ConfigMap and Secret by monitoring designated key-values. The provider periodically polls the key-values, if there is any value change, provider triggers ConfigMap and Secret refresh in accordance with the present data in Azure App Configuration.
299
+
300
+
The following sample instructs monitoring two key-values with 1 minute polling interval.
Setting the `spec.keyValues.refresh` property enables dynamic configuration data refresh in ConfigMap and Secret by monitoring designated key-values. The provider periodically polls the key-values, if there is any value change, provider triggers ConfigMap and Secret refresh in accordance with the present data in Azure App Configuration.
327
+
### Key Vault references
325
328
326
-
The following sample instructs monitoring two key-values with 1 minute polling interval.
329
+
The following sample instructs using a service principal to authenticate with a specific vault and a user-assigned managed identity for all other vaults.
Setting `spec.keyValues.keyVaults.refresh` property enables the provider periodically reload the latest version secrets from Azure Key Vault, and update the values for associated data items in generated Kubernetes secret accordingly.
355
354
356
-
The following sample instructs secret refresh with 10 minutes reloading interval.
355
+
Refreshing secrets from Key Vaults usually requires reloading the corresponding Key Vault references from Azure App Configuration. However, with the `spec.keyValues.keyVaults.refresh` property, you can refresh the secrets from Key Vault independently. This is especially useful for ensuring that your workload automatically picks up any updated secrets from Key Vault during secret rotation. Note that to load the latest version of a secret, the Key Vault reference must not be a versioned secret.
356
+
357
+
The following sample refreshes all non-versioned secrets from Key Vault every hour.
0 commit comments