Skip to content

DanLauerman/azure-app-config-testing

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Azure Key Vault App Config Demo

This demo shows how to use Azure Keyvault secrets to set application configuration settings

Following the Demo

  1. Build the docker image locally to run
  2. Push the docker image out to a docker hub
  3. Update main.tf file kv-name var with a unique keyvault name
  4. Update main.tf file with the docker image name
  5. Update main.tf file with the web app name (needs to be unique)
  6. Run az login at the terminal to authenticate to Azure
  7. terraform init in the ./terraform directory
  8. terraform apply in the ./terraform directory
  9. Go and add a secret to the keyvault that was created (through Azure portal)
  10. Update the application configuration key name in the app service to CONFIG_VALUE_SAMPLE
  11. Update the application configuration value in the app service to the name of your secret
  12. Call the endpoint {your website}/config_value to see the value
  13. Change the secret value
  14. run commands below to add fake app settings
  15. Call the endpoint {your website}/config_value to see the new value

Forcing a fake app setting to reload Keyvault based configurations

echo "current settings---" az webapp config appsettings list --name ase-app-config-test --resource-group rg-web-app echo "create temp setting---" az webapp config appsettings set --name ase-app-config-test --resource-group rg-web-app --settings my_temp_setting=ThisMakesTotalSense echo "delete temp setting---" az webapp config appsettings delete --name ase-app-config-test --resource-group rg-web-app --setting-names my_temp_setting

About

A demo app to help see the impact of using Azure key vault secrets as app service config values

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published