Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Azure Functions on AKS + KEDA #1633

Closed
alexandrelimait opened this issue Jun 23, 2020 · 2 comments
Closed

Azure Functions on AKS + KEDA #1633

alexandrelimait opened this issue Jun 23, 2020 · 2 comments

Comments

@alexandrelimait
Copy link

Hi,
It is not an issue, but a doubt.
I containerized my Function and deploy it on AKS + KEDA.
To use the Function I have an APIM in front of, in this APIM I inject the headers x-functions-key with the keys available in the Function to authenticate.
If I start with AKS, do I need to change the way I authenticate or there are some way to retrieve the keys inside the AKS? I am asking because i have a process to do a key rotation and another point if will i lost the IAM as well?

image

@v-anvari
Copy link

Hi @alexandrelimait , Apologies for the delayed response, The Authentication mechanism would still work in AKS the same way. You can continue to use either the header or the query string.

Tagging @ahmelsayed , for further insights on how to retrieve the keys

@ahmelsayed
Copy link

Yes, you can set your keys in a Kubernetes Secret, then set an env AzureWebJobsSecretStorageType=kubernetes You can then either create a serviceAccount to give the POD permissions to query for that secret, or mount it to the file system using Kubernetes volume mount. More on that here Azure/azure-functions-host#4462

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

5 participants