azure-service-operator
azure-service-operator copied to clipboard
Feature: Allow storing secrets in KeyVault
This was brought up in #1894 and also supported in ASOv1.
This is related to #1415 which was originally for ASOv1 but would apply to ASOv2 as well if it had KV support.
This is still something that we're tracking. There are various solutions to reading KeyVault secrets into Kubernetes, for example: https://external-secrets.io/ and https://docs.microsoft.com/en-us/azure/aks/csi-secrets-store-driver, but there aren't any inbuilt solutions for exporting secrets (say, storage account keys) to those stores securely.
Still something worth doing but hasn't been a lot of clamor for it yet
I'm also interested on this feature, I wanted to provision an Azure KeyVault along with some secrets. Initially I thought that I would find an ASO resource similar to "Microsoft.KeyVault/vaults/secrets"
I'm also interested on this feature, I wanted to provision an Azure KeyVault along with some secrets. Initially I thought that I would find an ASO resource similar to "Microsoft.KeyVault/vaults/secrets"
We purposefully had chosen not to do secret creation via ASO because it felt like these two goals were in conflict:
- KeyVault wants you to store your secrets only there, so they're the most secure.
- ASO must store the secret in Kubernetes somehow, in order to know what value to propagate to KeyVault when creating a new secret.
Can you expand more on why you want your secrets in KeyVault and Kubernetes? Can you give some (high level) examples of the scenarios you're looking to solve? Understanding those might help us to revisit the decision mentioned above and consider supporting KV key management through ASO.
At this point this feels more like a documentation thing as I believe there are projects that achieve this without needing to be as explicit about it as ASOv1 was. We need to close at least the doc gap though if not the actual feature gap.