This content is authored by Red Hat experts, but has not yet been tested on every supported configuration.
Installing the Kubernetes Secret Store CSI
Create an OpenShift Project to deploy the CSI into
Copyoc new-project k8s-secrets-store-csi
Set SecurityContextConstraints to allow the CSI driver to run (otherwise the DaemonSet will not be able to create Pods)
Copyoc adm policy add-scc-to-user privileged \ system:serviceaccount:k8s-secrets-store-csi:secrets-store-csi-driver
Add the Secrets Store CSI Driver to your Helm Repositories
Copyhelm repo add secrets-store-csi-driver \ https://kubernetes-sigs.github.io/secrets-store-csi-driver/charts
Update your Helm Repositories
Copyhelm repo update
Install the secrets store csi driver
Copyhelm install -n k8s-secrets-store-csi csi-secrets-store \ secrets-store-csi-driver/secrets-store-csi-driver \ --version v1.3.2 \ --set "linux.providersDir=/var/run/secrets-store-csi-providers"
Check that the Daemonsets is running
Copyoc -n k8s-secrets-store-csi get pods -l "app=secrets-store-csi-driver"
You should see the following
CopyNAME READY STATUS RESTARTS AGE csi-secrets-store-secrets-store-csi-driver-cl7dv 3/3 Running 0 57s csi-secrets-store-secrets-store-csi-driver-gbz27 3/3 Running 0 57s
Add pod security profile label for CSI Driver
This is required starting in OpenShift v4.13 Copyoc label csidriver/secrets-store.csi.k8s.io security.openshift.io/csi-ephemeral-volume-profile=restricted