Open ahlag opened 1 year ago
Added secrets as environment variables for Feathr that can be managed on Azure Key Vault Resolves https://github.com/feathr-ai/helm-charts/issues/9
Run the following command
helm install <Release Name> ./feathr-online-aks-integration \ --set pipelineConf=$(cat <absolute path>/pipeline.conf | base64) \ --set lookup=$(cat <absolute path>/lookup.json | base64) \ --set userAssignedIdentityID=<User Assigned Identity ID> \ --set tenantId=<Tenant ID>
User Assigned ID
az aks show -g <resource-group> -n <cluster-name> --query addonProfiles.azureKeyvaultSecretsProvider.identity.clientId -o tsv
To access your key vault, you can use the user-assigned managed identity that you created when you enabled a managed identity on your AKS cluster
Tenant ID
@blrchen Could you please check if this architecture is ok?
Description
Added secrets as environment variables for Feathr that can be managed on Azure Key Vault Resolves https://github.com/feathr-ai/helm-charts/issues/9
How was this PR tested?
Run the following command
User Assigned ID
To access your key vault, you can use the user-assigned managed identity that you created when you enabled a managed identity on your AKS cluster
Tenant ID
Does this PR introduce any user-facing changes?