Azure Service Bus authentication
Authenticate with Workload Identity
When access to your Service Bus is provided to Keda, any other Radix applications can scale their components based on your queue! Use authentication with connection string to avoid this.
We are hoping on improving this - https://github.com/kedacore/keda/issues/5630
ClientID to a managed identity should be provided, that contains a federated credential with following properties:
Federated credential scenario: Kubernetes Service Account
Cluster Issuer URL: https://northeurope.oic.prod-aks.azure.com/00000000-0000-0000-0000-000000000000/00000000-0000-0000-0000-000000000000/
Namespace: keda
Service Account: keda-operator
Cluster Issuer URL
- current value can be found in Radix console About page in the environment variable CLUSTER_OIDC_ISSUER_URL
.
Cluster Issuer URL can be changed during cluster migration, please watch the Slack channel #omnia_radix
for updates.
spec:
components:
- name: backend
horizontalScaling:
minReplicas: 0
maxReplicas: 2
triggers:
- name: azure-sb
azureServiceBus:
namespace: my-servicebus-namespace
queueName: my-queue
authentication:
identity:
azure:
clientId: 00000000-0000-0000-0000-000000000000
Read more about Azure workload identity
Authenticate with connection string
spec:
components:
- name: backend
horizontalScaling:
minReplicas: 0
maxReplicas: 2
triggers:
- name: azure-sb
azureServiceBus:
namespace: my-servicebus-namespace
queueName: my-queue
connectionFromEnv: SERVICE_BUS_CONNECTION
connectionFromEnv
- Name of the environment variable your deployment uses to get the connection string of the Azure Service Bus namespace.