Azure AKS-让整个群集访问Azure键值库

发布于 2025-01-22 10:43:54 字数 306 浏览 1 评论 0原文

我正在尝试找到一种将整个AKS群集提供给Azure密钥库的方法。我暂时通过遵循以下过程来实现此功能:

  • 转到群集的VMS->身份 - >将系统分配给“ On”为“ on”
  • 添加此托管身份作为键值策略。

但是,每当我停下来开始群集时,我都必须重新创建该托管身份并将其重新添加到密钥库中。我也尝试使用用户为VMS分配的身份,但这似乎不起作用。

出于其他原因,我也无法使用Azure POD Identities/CSI功能,因此我只是在寻找一种简单的方法来使我的群集永久访问密钥库。

提前致谢

I'm trying to find a way to give an entire AKS cluster to Azure Key vault. I have temporarily got this working by following the below process:

  • Go to the VMSS of the cluster -> Identity -> Set System Assigned Status to 'On'
  • Add this Managed identity as an access policy to Key Vault.

This works, however whenever I stop and start the cluster, I have to re-create this managed identity and re-add it to Key Vault. I have tried using the User Assigned Identities for the vmss as well but that does not seem to work.

I also cannot use the azure pod identities/CSI features for other reasons so I'm just looking for a simple way to give my cluster permanent access to key Vault.

Thanks in advance

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。

评论(1

贱贱哒 2025-01-29 10:43:54
  • POD是Kubernetes中最小的单位。 POD是一个或多个一个或多个容器,它们在相同的HOS t(节点)上组合在一起。
  • POD运行一个由主机控制的节点。
  • POD使用 OS级别虚拟化,可以在运行时消耗VMS的资源,并根据要求。

停止和重新启动群集/节点POD将失去所有导致POD损失的资源 。因此,在您重新启动之前,VMS将没有POD。 和另一个IP地址创建新的POD。

如果您重新启动群集/节点,则将使用其他名称 .com/azure/aad-pod-distionity/essution/898“ rel =“ nofollow noreferrer”> github 讨论,我发现 麦克风(托管身份群集)删除了当没有配置POD使用该身份时,来自基础VMS的身份。因此,您必须重新创建VMS的托管身份。

您可以参考 link 为了更好地了解如何从Azure Aks访问KeyVault。

  • Pod is smallest unit in Kubernetes. Pod is a group of one or more containers that are deployed together on the same host (node).
  • Pod runs a node which is controlled by master.
  • Pod uses OS level virtualization which can consume resources of VMSS when it runs and based on requirement.

Stopping and restarting cluster/nodes pod will lose all the resources that leads to loss of pods. So, there will be no pod under VMSS until you restart. In case you restart your cluster/node, the new pod will be created with different name and with another IP address.

From this github discussion, I found that MIC (Managed Identity Cluster) removes the identity from the underlying VMSS when no pods are configured to use that identity. So, you have to recreate the Managed Identity for VMSS.

You can refer this link for better understanding how to access keyvault from Azure AKS.

~没有更多了~
我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
原文