Arindam Das
1 min readJun 8, 2023

--

Thanks Santhosh! Now for your query, to refresh running pods in AKS when a secret is updated in Azure Key Vault, you can use the following steps:

1. Enable the Azure Key Vault Provider for Secrets Store CSI Driver in your AKS cluster. This will allow your pods to mount secrets from Azure Key Vault.

2. Create a Kubernetes Secret that references the secret in Azure Key Vault.

3. Update the Kubernetes Secret with the new value for the secret.

4. The Azure Key Vault Provider for Secrets Store CSI Driver will automatically update the mounted secret in your pods.

Here are some standard implementation patterns for this scenario:

Use a DaemonSet to ensure that all pods in your cluster have access to the Azure Key Vault Provider for Secrets Store CSI Driver.

Use a CronJob to periodically check for changes to secrets in Azure Key Vault and update the corresponding Kubernetes Secrets.

Use an Event Driven Framework, such as Azure Event Grid, to trigger an event when a secret is updated in Azure Key Vault.

The best implementation pattern for your specific scenario will depend on your specific requirements.

I hope this helps!

--

--

Arindam Das
Arindam Das

No responses yet