Advice to use a feature of Azure KeyVault managed storage account access keys to kuberenets(AKS) via secrets store CSI driver #1093
Unanswered
subhranil05
asked this question in
Q&A
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hello everyone I went through the docs of r azuer secrets store CSI driver https://azure.github.io/secrets-store-csi-driver-provider-azure/docs/getting-started/ where I am trying to find an use case as below
I want to create Azure Key Vault managed storage account for the features of auto rotation of access keys automatically by Key vault in a given period of time.
Now I have created the Azure Key Vault managed storage account and enabled the auto rotation of key1 .
BUT the problem is Azure Key Vault only auto rotates the storage account access key but not store them as key/secret in key vault.
Now I want to use this storage account acess key to mount in kubernete's pod with the help of secrets store CSI driver and enable the auto rotation feature where mount will be refreshed every time new value is added to that access keys in key Vault.
this is not possible at current time for me as I see the configuration of 'SecretProviderClass' always use object key/secret/cert which is saved in Key Vault , but in my case its not happening.
Is there any feature available to overecome the issue of my use case or can we add a feature like this to secrets store CSI driver?
Any help/guide regarding above will be appreciated. Thanks
Beta Was this translation helpful? Give feedback.
All reactions