What if I tell you that it’s possible to connect you AKS pods to an Azure Key Vault using identities but without having to use credentials in an explicit way?
Well with AAD Pod Identities you can enable your Kubernetes applications to access Azure cloud resources securely using Azure Active Directory (AAD) including Azure Key Vault.
The following gist show a PowerShell script that will help you setup everything inside your RBAC enabled AKS cluster. You will also need to have Azure CLI installed on your box and an Azure Key Vault deployed in the same resource group where your AKS lives.
param(
[string]
[Parameter(Mandatory = $true)]
$resourceGroupName,
[string]
[Parameter(Mandatory = $true)]
$identityName,
[string]
[Parameter(Mandatory = $true)]
$identitySelector,
[string]
[Parameter(Mandatory = $true)]
$aksName,
[string]
[Parameter(Mandatory = $true)]
$keyVaultName
)
# Get the current subscription
$subscriptionId = (az account show | ConvertFrom-Json).id
# Get aks so we can extract it's Service Princpal later
$aks = az aks show `
-g $resourceGroupName `
-n $aksName | ConvertFrom-Json
# Create Managed Identity
$identity = az identity create `
-g $resourceGroupName `
-n $identityName `
-o json | ConvertFrom-Json
# Assign the Reader role to the Managed Identity
az role assignment create `
--role "Reader" `
--assignee $identity.principalId `
--scope /subscriptions/$subscriptionId/resourcegroups/$resourceGroupName
# Assign the Managed Identity Operator role to the AKS Service Principal
az role assignment create `
--role "Managed Identity Operator" `
--assignee $aks.servicePrincipalProfile.clientId `
--scope $identity.id
# Add policy to the Key Vault so the Managed Identity can read secrets
az keyvault set-policy `
--name $keyVaultName `
--spn $identity.clientId `
--secret-permissions get list
# Enable AAD Pod Identity on AKS
kubectl apply -f https://raw.githubusercontent.com/Azure/aad-pod-identity/master/deploy/infra/deployment-rbac.yaml
# Create the Azure Identity and AzureIdentityBinding yaml on the fly
$k8sAzureIdentityandBinding = @"
apiVersion: "aadpodidentity.k8s.io/v1"
kind: AzureIdentity
metadata:
name: $($identityName)
spec:
type: 0
ResourceID: $($identity.id)
ClientID: $($identity.clientId)
---
apiVersion: "aadpodidentity.k8s.io/v1"
kind: AzureIdentityBinding
metadata:
name: $($identityName)-identity-binding
spec:
AzureIdentity: $($identityName)
Selector: $($identitySelector)
"@
# Deploy the yamls
$k8sAzureIdentityandBinding | kubectl apply -f -
The script creates a Manged Identity, assigns some permissions to it and creates a policy inside the Key Vault enabling the Identity to list and get secrets.
Then the Managed Identity Controller (MIC) deployment and the Node Managed Identity (NMI) daemon set are deployed inside the cluster.
In the last step, two resources are deployed. The first one is an AzureIdentity that will be used to identify the Managed Identity inside your cluster and the second one is an AzureIdentityBinding that binds the azure Identity with a Selector.
Let’s run the powershell command with the following parameters:
- Resourece Group : myResourceGroup
- Managed Identity Name : myId
- Identity Selector : requires-vault
- AKS Name : myAKS
- Key Vault Name : myKeyVault
.\SetupPodIdentityKeyVaultIntegration.ps1 myResourceGroup myId requires-vault myAKS myKeyVault
Once the command is done, any pod marked with the aadpodidbinding: requires-vault label will get an Identity assigned.
To check that everything is working as expected you can create a deployment.yaml with the following contents:
---
apiVersion: apps/v1beta1
kind: Deployment
metadata:
name: az-keyvault-reader-test
spec:
replicas: 1
template:
metadata:
labels:
app: az-keyvault-reader-test
aadpodidbinding: requires-vault
spec:
containers:
- name: busybox
image: busybox
command:
[
"sh",
"-c",
"wget --tries=70 -qO- http://127.0.0.1:8333/secrets/<SECRET_NAME>/",
]
imagePullPolicy: Always
resources:
requests:
memory: "4Mi"
cpu: "100m"
limits:
memory: "8Mi"
cpu: "200m"
- name: az-keyvault-reader-sidecar
image: cmendibl3/az-keyvault-reader:0.2
imagePullPolicy: Always
env:
- name: AZURE_KEYVAULT_NAME
value: <AZURE_KEYVAULT_NAME>
resources:
requests:
memory: "8Mi"
cpu: "100m"
limits:
memory: "16Mi"
cpu: "200m"
restartPolicy: Always
Note : Replace the values for with the name of your Key Vault and with the name of an existing secret stored in your Key Vault:
Now deploy to Kubernetes:
kubectl apply -f ./deployment.yaml
and check the logs for the busybox pod:
kubectl logs -f $(kubectl get po --selector=app=az-keyvault-reader-test -o jsonpath='{.items[*].metadata.name}') -c busybox -w
If everything is OK you should see the value of your secret dumped in the logs (Bad security practice here)!!! And yes you did all this without knowing any credentials!
Please find the code used to connect to the Azure KeyVault here: az-keyvault-reader.go and check AAD Pod Identity for more information on how this “magic” works.
Hope it helps!
Top comments (4)
Hi Carlos,
Great Article!
kind regards,
Rodrigo Rios
Hi, Carlos!
Could you explain what the
-
at the end of the kubectl command is doing?I'm referring to this line:
$k8sAzureIdentityandBinding | kubectl apply -f -
Hi Catherine it makes kubectl process the standard input.
Quick Question Carlos,
For your setup, what is the AKS configuration?
RBAC and AKS Service Principal?
or RBAC with AKS managed Identity? (Systemassigned)
kind regards,
Rodrigo Rios