We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
A secret store CSI driver can be used to inject the secrets into the KBS file store. See the following blog describing how Azure Key Vault Storage is used to inject secrets into the KBS file store - https://confidentialcontainers.org/docs/key-broker-service/kbs-backed-by-akv/ Similar approach can be followed with Hashicorp vault: https://developer.hashicorp.com/vault/docs/platform/k8s/csi
This issue is to track adding support in the operator for the same
Ref: https://secrets-store-csi-driver.sigs.k8s.io/getting-started/usage.html
The text was updated successfully, but these errors were encountered:
Merge pull request confidential-containers#16 from spotlesstofu/multi…
28047e6
…-arch tekton: add multi-arch build pipeline
This will be mostly documentation. cc @lmilleri
Sorry, something went wrong.
No branches or pull requests
A secret store CSI driver can be used to inject the secrets into the KBS file store. See the following blog describing how Azure Key Vault Storage is used to inject secrets into the KBS file store - https://confidentialcontainers.org/docs/key-broker-service/kbs-backed-by-akv/
Similar approach can be followed with Hashicorp vault: https://developer.hashicorp.com/vault/docs/platform/k8s/csi
This issue is to track adding support in the operator for the same
Ref: https://secrets-store-csi-driver.sigs.k8s.io/getting-started/usage.html
The text was updated successfully, but these errors were encountered: