You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The RabbitMQ cluster should start successfully with secrets populated from Azure Key Vault.
Additional context
The RabbitMQ deployment fails due to missing secrets, even though they are configured in Azure Key Vault and referenced in the SecretProviderClass.
Additional Information
I have ensured that the managed identity has access to read secrets from Azure Key Vault by creating a test pod.
I manually created the secret with the annotation secrets-store.csi.k8s.io/used: "true", but the secrets remain empty in Kubernetes even after deploying using cluster operator that references the SecretProviderClass.
Please advise on how to resolve this integration issue or if there are any known limitations with this setup.
The text was updated successfully, but these errors were encountered:
I am facing challenges integrating RabbitMQ with Azure Key Vault using the Secrets Store CSI Driver in my Kubernetes environment.
Environment
Reproduction steps
SecretProviderClass
to fetch TLS certificates and credentials from Azure Key Vault.SecretServiceProvider.yaml
rabbitmq-cluster-definitions.yaml
rabbitmq-cluster.yaml
Expected behavior
The RabbitMQ cluster should start successfully with secrets populated from Azure Key Vault.
Additional context
The RabbitMQ deployment fails due to missing secrets, even though they are configured in Azure Key Vault and referenced in the
SecretProviderClass
.Additional Information
secrets-store.csi.k8s.io/used: "true"
, but the secrets remain empty in Kubernetes even after deploying using cluster operator that references theSecretProviderClass
.Please advise on how to resolve this integration issue or if there are any known limitations with this setup.
The text was updated successfully, but these errors were encountered: