-
Notifications
You must be signed in to change notification settings - Fork 196
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to install SecretProviderClass using Helm chart #726
Comments
This issue is stale because it has been open 14 days with no activity. Please comment or this will be closed in 7 days. |
Bumping this. I was able to get things running, however guidance on the preferred way to setup RBAC would be appreciated, or feedback on the suggested automated setup of appropriate RBAC profiles when installing the chart. |
This issue is stale because it has been open 14 days with no activity. Please comment or this will be closed in 7 days. |
This issue was closed because it has been stalled for 21 days with no activity. Feel free to re-open if you are experiencing the issue again. |
How were you able to get this working? Having the exact same issue on my cluster. |
I created my own cluster role and assigned it to my service account.
Please note my RBAC is pretty lax and could (should?) likely be tightened further. What I am not happy with is how the Secrets Store doesn't provide an ou-of-the-box clusterrole to do this, yet it requires the permission in order to create resources required to use the driver. |
Hello 👋🏻 We recently merged a PR in the driver to add custom roles for |
I am following this documentation to enable the Secrets Store CSI driver provider in an existing aks cluster, which was provisioned using Terraform (as far as my understanding goes, there is no Terraform API to do so, yet).
The chart providing the extension was successfully installed as I can see the pods running:
$ kubectl get pods -n kube-system -l 'app in (secrets-store-csi-driver, secrets-store-provider-azure)' NAME READY STATUS RESTARTS AGE aks-secrets-store-csi-driver-glqkd 3/3 Running 0 3h4m aks-secrets-store-csi-driver-m5clf 3/3 Running 0 3h4m aks-secrets-store-provider-azure-cm8c4 1/1 Running 0 3h4m aks-secrets-store-provider-azure-l29rn 1/1 Running 0 3h4m
I have successfully configured the user-managed identity and am now trying to create the SecretProviderClass using a Helm chart like the following, from an Azure DevOps pipeline:
The reason to do this is that the SecretProviderClass - if I understand correctly - needs to be updated every time a secret is added/removed from the deployments that will use them, and this step would ensure it is always up-to-date before the Helm charts depending on it are run. The Helm task, however, fails with the following error:
My service account was assigned the
admin
clusterrolebinding, I checked the available clusterrolebindings to understand if I need to add additional permissions to it, however none of them seems to havecreate
permission on thesecretproviderclasses.secrets-store.csi.x-k8s.io
resource type.Am I supposed to create my own cluster role to handle this? While the
cluster-admin
role should be able to create these resources, for the use-case described above a less privileged service account should be sufficient and am therefore surprised a "standard" clusterrole is not provided for this purpose.Suggestions and/or feedback are welcome 🙂
The text was updated successfully, but these errors were encountered: