-
Notifications
You must be signed in to change notification settings - Fork 146
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
How to migrate storeAccountKey from true to false #1218
Comments
@susanwangmcpod if you don't want to store AccountKey as secret, you need to:
|
Thanks, Andy. I will have a test. |
@andyzhangx my customer spent some time in testing above shared steps. It works. But they feedbacked that this is still unable to meet their requirements, because pods are unable to access files after storage account keys rotate. This means their app still have some downtime until these pods are recreated. So customer is asking whether there exists any other methods to avoid such downtime when storage account keys rotate? Thanks in advance. |
@susanwangmcpod
|
Thanks, Andy. |
Hello @andyzhangx , I did some tests, and it looks like that kubelet identity always fetches the first storage account key (key1). Is this by design? My guess is if kubelet identity can fetch the latest rotated key, then we may follow the similar steps as above to reduce downtime with kubelet identity as well. Thanks. |
@susanwangmcpod that's a good suggestion, currently it's always getting the first key, but I think we make a change in the next version to always get the key with latest CreationTime, by that way, if you are using kubelet identity to get account key directly, it could be:
|
Many thanks, Andy. |
@andyzhangx hello andy, for the time of next version release, do you have an estimation time? |
@yzhang0727 working on this now |
Hello Andy, I see that there so many manual steps involved to rotate keys. Is there a way to automatically do this without having to perform those steps? |
@rkarra08101992 after setting following two parameters in storage class, you could try following steps to validate it works, and then you could automate those cli commands
|
My customer uses AKS with Azure Files PVs, which were dynamically provisioned previously, and the storage account keys are stored in the secrets.
Now due to security policies, they need to rotate storage account keys periodically. If the PVs are dynamically provisioned from SC with parameter storeAccountKey: false, then it just needs to recreate pods after storage account keys are changed.
However, customer now has many existing PVs which were dynamically provisioned from SC without specifying the parameter storeAccountKey, so the storage account keys are stored in the secrets now.
So are there any ways to migrate storeAccountKey from true to false? If this is not possible, then whether we have any other methods to update secrets with new storage account keys automatically? Thanks in advance.
The text was updated successfully, but these errors were encountered: