external-secrets: AKS - Kubernetes Provider ServiceAccount Auth Bug?
Describe the solution you’d like Get secrets from the local or a remote Kubernetes cluster.
What is the added value? Verify Kubernetes Provider ServiceAccount auth is working.
Observations (Constraints, Context, etc):
It seems that I am missing something when using the Kubernetes Provider. Can someone help me or verify that is working (or not working) ?
I am using the exact example from the PR that was merged: https://github.com/external-secrets/external-secrets/pull/1201
and getting the error “client is not allowed to get secrets”. Is the example outdated?
ClusterSecretStore
:
Events:
Type Reason Age From Message
---- ------ ---- ---- -------
Warning ValidationFailed 2m33s (x16 over 5m18s) cluster-secret-store client is not allowed to get secrets
ExternalSecret
:
NAMESPACE NAME STORE REFRESH INTERVAL STATUS READY
default externalsecret.external-secrets.io/example-kubernetes kubernetes 1m SecretSyncedError False
Versions: Kubernetes: v1.23.8 ESO: v0.7.1
About this issue
- Original URL
- State: closed
- Created a year ago
- Comments: 15 (7 by maintainers)
Hi. So we found the issue!
The terraform AKS module https://github.com/Azure/terraform-azurerm-aks does not seem to support the default RBAC permissions of enabling local accounts for AKS or we were not able to use it correctly (or maybe it is not even working we do not know). Rather than using local accounts it just completely disables RBAC which is not possible in the UI.
Thanks for the help!! I am closing this issue.