Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[FEATURE] Add support for Azure as secret manager #114

Open
mlodhia10 opened this issue Aug 23, 2024 · 0 comments
Open

[FEATURE] Add support for Azure as secret manager #114

mlodhia10 opened this issue Aug 23, 2024 · 0 comments
Labels
help wanted Extra attention is needed

Comments

@mlodhia10
Copy link

mlodhia10 commented Aug 23, 2024

Looking for support and guidance to utilize Azure Key Vault as secret manager to encrypting sensitive configurations.

Proposed Solution

  1. Enable Key Vault Integration with Docker:
    Use Azure Key Vault Provider for Secrets Store CSI Driver:
    Azure offers a way to mount secrets directly from Key Vault into your container as files. You can use the Azure Key Vault Provider for Secrets Store CSI Driver to achieve this.
    This method works well if you are deploying your containers in an Azure Kubernetes Service (AKS) environment. For Azure Container Apps, similar functionality is offered through the secrets configuration option in the container's settings.

  2. Mount Secrets as Environment Variables:
    Mount Key Vault Secrets:
    In your container app configuration, you can reference secrets stored in Azure Key Vault and map them as environment variables.
    This is done by configuring the container app to use the secretRef to Key Vault secrets, making them accessible as environment variables in your application.

  3. Configure Tartarus to Use Environment Variables:
    Environment Variable Access:
    Modify Tartarus to read sensitive configuration like encryption keys, database passwords, etc., from environment variables.
    Since the secrets are now mounted as environment variables, Tartarus can access them directly, simplifying the secret management process.

  4. Set Up Managed Identity for Secure Access:
    Assign Managed Identity:
    Ensure your Azure Container App has a managed identity assigned, and this identity has the necessary access to the Azure Key Vault.
    Key Vault Access Policies:
    Update your Key Vault’s access policies to grant the managed identity Get and List permissions for secrets.

@NishantJoshi00 NishantJoshi00 added help wanted Extra attention is needed hacktoberfest Issues that are up for grabs for Hacktoberfest participants labels Sep 23, 2024
@NishantJoshi00 NishantJoshi00 changed the title Add support for Azure as secret manager [FEATURE] Add support for Azure as secret manager Sep 25, 2024
@NishantJoshi00 NishantJoshi00 removed the hacktoberfest Issues that are up for grabs for Hacktoberfest participants label Sep 25, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
help wanted Extra attention is needed
Projects
None yet
Development

No branches or pull requests

2 participants