You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
What happened: We mapped workload identity to UAMI with RBAC role (SMB Elevated Contributor) on desired storage account scope, however it raises permission denied on mount attempt when storage account keys are disabled on this storage account. When we enable storage account keys it starts to work again.
What you expected to happen: CSI Driver should use RBAC role instead of downloading storage keys
How to reproduce it: Setup CSI connection to storage account with usage of workload identity -> disable storage keys on desired accounts -> try to run the application
Anything else we need to know?:
Environment:
CSI Driver version: 1.30
Kubernetes version (use kubectl version): 1.27.7
OS (e.g. from /etc/os-release): Ubuntu Linux
Kernel (e.g. uname -a): managed by MS
Install tools:
Others:
Lingkar, pranaysahith, asjonos, rohank07, margreiext and 3 more