azurenoops / terraform-azurerm-overlays-kubernetes

Terraform overlay module to manage a SCCA Compliant Managed Kubernetes Cluster (also known as AKS / Azure Kubernetes Service) and optional resources for use with the Azure NoOps.
MIT License
0 stars 0 forks source link

AKS-KeyVault to manage keys #24

Closed cheruvu1 closed 1 year ago

cheruvu1 commented 1 year ago

Is there an existing issue for this?

Greenfield/Brownfield provisioning

None

Terraform Version

No response

Module Version

No response

AzureRM Provider Version

No response

Affected Resource(s)/Data Source(s)

No response

Terraform Configuration Files

No response

tfvars variables values

No response

Debug Output/Panic Output

No response

Expected Behaviour

No response

Actual Behaviour

No response

Steps to Reproduce

No response

Important Factoids

No response

References

No response

cheruvu1 commented 1 year ago

To integrate Azure Key Vault to AKS, this requires an add-on called azure-keyvault-secrets-provider

1) There are two pieces of this add on. One is the Secrets Store CSI Driver for Kubernetes secrets – Integrates secrets stores with Kubernetes via a Container Storage Interface (CSI) volume.

The Secrets Store CSI Driver secrets-store.csi.k8s.io allows Kubernetes to mount multiple secrets, keys, and certs stored in enterprise-grade external secrets stores into their pods as a volume. Once the Volume is attached, the data in it is mounted into the container’s file system.

2) The second is the Azure Key Vault Provider for Secrets Store CSI Driver which allows for the integration of an Azure key vault with an Azure Kubernetes Service (AKS) cluster.

3) Access security between the AKS cluster to the key vault using a user assigned managed identity.

cheruvu1 commented 1 year ago

Code changes completed to Enable the AddOn azureKeyvaultSecretsProvider. This add-on also installs the CSI Drivers required for AKS to KeyVault connectivity.

Other changes are required for an end-to-end AKS and KeyVault integration solution, creating separate user stories.

Pull requested created: Enable key_vault_secrets_provider story changes #30