v1.0.0
release for the driver and providerHelm chart version
1.0.0
The v1.0.0
version of the Secrets Store CSI Driver and later uses the v1
API version for SecretProviderClass
and SecretProviderClassPodStatus
CustomResourceDefinition
s. secrets-store.csi.x-k8s.io/v1alpha1
version of the CRDs will continue to work, but consider updating your YAMLs to use secrets-store.csi.x-k8s.io/v1
.
syncSecret.enabled
is set to false by default for the CSI driver.syncSecret.enabled
has been set to false by default. This means the RBAC clusterrole and clusterrolebinding required for sync mounted content as Kubernetes secret will no longer be created by default as part of helm install/upgrade
. If you’re using the driver to sync mounted content as Kubernetes secret, you’ll need to set secrets-store-csi-driver.syncSecret.enabled=true
as part of helm install/upgrade
.If the secrets-store-csi-driver.syncSecret.enabled=true
isn’t explicitly set in helm install/upgrade
command, it’ll result in failure to create Kubernetes secret and the error would be similar to:
E0610 22:27:02.283100 1 secretproviderclasspodstatus_controller.go:325] "failed to create Kubernetes secret" err="secrets is forbidden: User \"system:serviceaccount:default:secrets-store-csi-driver\" cannot create resource \"secrets\" in API group \"\" in the namespace \"default\"" spc="default/azure-linux" pod="default/busybox-linux-5f479855f7-jvfw4" secret="default/dockerconfig" spcps="default/busybox-linux-5f479855f7-jvfw4-default-azure-linux"
0.0.9+
release of the Azure Key Vault provider is incompatible with the Secrets Store CSI Driver versions < v0.0.14
.Prior to v0.0.14
release of the Secrets Store CSI Driver, the driver communicated with the provider by invoking the provider binary installed on the host. However with v0.0.14
the driver now introduces a new option to communicate with the provider using gRPC. This feature is enabled by a feature flag in the driver --grpc-supported-providers=azure
. The 0.0.9
release of the Azure Key Vault provider implements the gRPC server changes and is no longer backward compatible with the Secrets Store CSI Driver versions < v0.0.14
.
Please carefully read this doc as you upgrade to the latest release of the Azure Key Vault Provider
helm upgrade
to the latest chart release in the repo will update the Azure Key Vault Provider and Secrets Store CSI Driver to the compatible versions
v0.0.14+
0.0.9+
--grpc-supported-providers=azure
to enable communication between driver and provider using gRPCRun the following commands to confirm the images have been updated -
➜ kubectl get ds -l app=secrets-store-csi-driver -o jsonpath='{range .items[*]}{.spec.template.spec.containers[1].image}{"\n"}'
mcr.microsoft.com/k8s/csi/secrets-store/driver:v0.0.14
--grpc-supported-providers=azure
➜ kubectl get ds -l app=secrets-store-csi-driver -o jsonpath='{range .items[*]}{.spec.template.spec.containers[1].args}{"\n"}'
["--debug=true","--endpoint=$(CSI_ENDPOINT)","--nodeid=$(KUBE_NODE_NAME)","--provider-volume=/etc/kubernetes/secrets-store-csi-providers","--grpc-supported-providers=azure","--metrics-addr=:8080"]
0.0.9+
➜ kubectl get ds -l app=csi-secrets-store-provider-azure -o jsonpath='{range .items[*]}{.spec.template.spec.containers[0].image}{"\n"}'
mcr.microsoft.com/oss/azure/secrets-store/provider-azure:0.0.9
The driver and provider need to be updated one after the other to ensure compatible versions are being run.
--grpc-supported-providers=azure
to the Linux and Windows daemonset manifests.helm upgrade
with --set grpcSupportedProviders=azure
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.