-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for AKS CSI Storage Driver #12826
Comments
This is important because it seems you can't enable this on an existing cluster with |
I see this covered in the docs here: https://docs.microsoft.com/en-us/azure/aks/csi-secrets-store-driver#upgrade-an-existing-aks-cluster-with-secrets-store-csi-driver-support
|
I think the request is more about enabling CSI in general on the cluster, and as specified here https://docs.microsoft.com/en-us/azure/aks/csi-storage-drivers#limitations it can't be done other than at cluster creation time. I think that the addon you are referencing will require the CSI to be enabled in the first place , then the addon can be installed. |
Hi there and thank you for reporting this. This appears to be a duplicate of an earlier reported issue #12783, so I'm going to close this one to keep the discussion concise. |
@favoretti i might be wrong but i don't think they are duplicate. This request is about enabling the CSI addon which is a pre-requisite of enabling the secrets one in #12783. |
@primeroz from what I understand those will be addon parameters, so will need to be tackled/implemented in one go, WDYT? |
I was not really talking about the implementaion, more about the scope of the Github issue :) Also everytime i visit the docs on azure for CSI they seem to have changed ! As of now the CSI support is enabled by setting : for the Secrets one i understand we need to enable the addon as described in the docs So i think that with this issue we could track adding support for CSI in the control plane ( which requires a new resource creation since it can only be set at cluster creation time ) , then people ( like me ) might want to add any number of CSI Drivers on the cluster in a self-managed fashion |
@primeroz re-opened, let's see when someone gets to it. That said, since it's a preview feature, as you can see it changes quite often still, so I'm not sure we can expect sensible API support for it soon. But I'm interested in this one as well, so I'll try to dive into it. |
👍 i think csi is finally GA on azure since it will be default soon |
@favoretti I can understand that it might not be worthwhile to add this preview feature to For users that still want to activate this preview feature on their AKS cluster a solution for now would be installing it via the Secrets Store CSI Driver Helm chart.
A Helm chart is available for other preview features as well, such as Azure Pod Identity. See #9885 (comment) for how I got that working. |
I took a quick look at implementing the --addons azure-keyvault-secrets-provider function, however, as it’s preview unless your subscription has it enabled it cause terraform to fail as the api reports you need to enable it. I new at TF code, so not sure how I make the configuration option only present in the api request if you have declared it in your tf code. |
@favoretti As far as I can tell this feature has been GA since July 25th according to this issue, but it requires setting this property I posted in that provider issue what I think might be a solution to do it, but I'm not well versed in terraform provider source code. Happy to try to fix this if given the proper guidance, but also happy to let someone more experienced fix this faster. |
Starting in Kubernetes version 1.21, Kubernetes will use CSI drivers only and by default. These drivers are the future of storage support in Kubernetes. With 1.21 being GA for a while, this header is only useful for current supported version 1.19 and 1.20. These being out of support Nov 2021 (1.19) and Feb 2022 (1.20), I'm going to close this issue. Custom header support can still be tracked in #6793, which (if properly implemented) would also support this use-case. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Description
Add the feature flags necessary to enable CSI driver support: https://docs.microsoft.com/en-us/azure/aks/csi-storage-drivers
New or Affected Resource(s)
Potential Terraform Configuration
References
The text was updated successfully, but these errors were encountered: