Using secretless Azure Functions from within AKS

Published Mar 05 2022 08:00 AM 2,794 Views

I recently implemented a change in KEDA (currently evaluated as a potential pull request), consisting of leveraging managed identities in a more granular way, in order to adhere to the least privilege principle. While I was testing my changes, I wanted to use managed identities not only for KEDA itself but also for the Azure Functions I was using in my tests. I found out that although there are quite a few docs on the topic, none is targeting AKS:

 

https://docs.microsoft.com/en-us/azure/azure-functions/functions-bindings-storage-queue-trigger?tabs...

https://docs.microsoft.com/en-us/azure/azure-functions/functions-reference?tabs=blob#connecting-to-h...

 

You can find many articles showing how to grab a token from an HTTP triggered function, or using identity-based triggers, but in the context of a function hosted in Azure itself. It's not rocket science to make this work in AKS but I thought it was a good idea to recap it here as I couldn't find anything on that.

 

Quick intro to managed identities

Here is a quick reminder for those who would still not know about MI. The value proposition of MI is: no password in code (or config). MI are considered best practices because the credentials used by identities are entirely managed by Azure itself. Workloads can refer to identities without the need to store credentials anywhere. On top of this, you can manage authorization with Azure AD (single pane of glasses), unlike shared access signatures and alternate authorization methods.

AKS & MI

For MI to work in AKS, you need to enable them. You can find a comprehensive explanation on how to do this here. In a nutshell, MI works the following way in AKS:

 

aksnmi.png

 

 

An AzureIdentity and AzureIdentityBinding resource must be defined. They target a user-assigned identity, which is attached to the cluster's VM scale set. The identity can be referred to by deployments through the aadpodbinding annotation. The function (or anything else) container makes a call to the MI system endpoint http://169..., that is intercepted by the NMI pod, which in turn, performs a call to Azure Active Directory to get an access token for the calling container.  The calling container can present the returned token to the Azure resource to gain access.

 

Using the right packages for the function

The packages you have to use depend on the Azure resource you interact with. In my example, I used storage account queues as well as service bus queues. To leverage MI from within the function, you must:

  • use the Microsoft.Azure.WebJobs.Extensions.Storage >= 5.0.0
  • use the Microsoft.Azure.WebJobs.Extensions.ServiceBus >= 5.0.0
  • use the Microsoft.NET.Sdk.Functions >= 4.1.0

Note that the storage package is not really an option because Azure Functions need an Azure Storage account for the most part.

Passing the right settings to the function

Azure functions takes their configuration from the local settings and from their host's configuration. When using Azure Functions hosted on Azure, we can simply use the function app settings. In AKS, this is slightly different as we have to pass the settings through a ConfigMap or a Secret. To target both the Azure Storage account and the Service Bus, you'll have to define a secret like the following:

 

data:
  AzureWebJobsStorage__accountName: <base64 value of storage account name>
  ServiceBusConnection__fullyQualifiedNamespace: <base64 value of the service bus FQDN> 
  FUNCTIONS_WORKER_RUNTIME: <base64 value of the function language>
apiVersion: v1
kind: Secret
metadata:
  name: <secret name>
---
In the above example, I use the same storage account for my storage-queue trigger as well as the storage account that is required by functions to work. In case I was using a different storage account for the queue trigger, I'd declare an extra setting with the account name. The service bus queue-triggered function relies on the __fullyQualifiedNamespace to start listening to the service bus. Paradoxally, although I create a K8s secret, there is no secret information here, thanks to the MI.
 
For your reference, I'm pasting the entire YAML here:
 
data:
  AzureWebJobsStorage__accountName: <base64 value of the storage account name>
  ServiceBusConnection__fullyQualifiedNamespace: <base64 value of the service bus FQDN>
  FUNCTIONS_WORKER_RUNTIME: <base64 value of the function code>
apiVersion: v1
kind: Secret
metadata:
  name: misecret
---
apiVersion: aadpodidentity.k8s.io/v1
kind: AzureIdentity
metadata:
  name: storageandbushandler
  annotations:
    aadpodidentity.k8s.io/Behavior: namespaced
spec:
  type: 0
  resourceID: /subscriptions/.../resourceGroups/.../providers/Microsoft.ManagedIdentity/userAssignedIdentities/storageandbushandler
  clientID: <client ID of the user-assigned identity>
---
apiVersion: aadpodidentity.k8s.io/v1
kind: AzureIdentityBinding
metadata:
  name: storageandbushandler-binding  
spec:
  azureIdentity: storageandbushandler
  selector: storageandbushandler
---
apiVersion: apps/v1
kind: Deployment
metadata:
  name: busandstoragemessagehandlers
  labels:
    app: busandstoragemessagehandlers    
spec:
  selector:
    matchLabels:
      app: busandstoragemessagehandlers
  template:
    metadata:
      labels:
        app: busandstoragemessagehandlers
        aadpodidbinding: storageandbushandler
    spec:
      containers:
      - name: secretlessfunc
        image: stephaneey/secretlessfunc:dev
        imagePullPolicy: Always
        envFrom:
        - secretRef:
            name: misecret
---
You can see that the secret is passed to the function through the envFrom attribute. If you want to give it a test, you can use the docker image I pushed to Docker Hub.
 
and the code of both functions, embedded in the above docker image (nothing special):
[FunctionName("StorageQueue")]
        public void StorageQueue([QueueTrigger("myqueue-items", Connection = "AzureWebJobsStorage")]string myQueueItem, ILogger log)
        {
            log.LogInformation($"C# Queue trigger function processed: {myQueueItem}");
        }

        [FunctionName("ServiceBusQueue")]
        public void ServiceBusQueue([ServiceBusTrigger("myqueue-items", Connection = "ServiceBusConnection")] string myQueueItem, ILogger log)
        {
            log.LogInformation($"C# Queue trigger function processed: {myQueueItem}");
        }
 
You just need to make sure the connection string names you mention in the triggers correspond to the settings you specify in the K8s secret.
%3CLINGO-SUB%20id%3D%22lingo-sub-3248143%22%20slang%3D%22en-US%22%3EUsing%20secretless%20Azure%20Functions%20from%20within%20AKS%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3248143%22%20slang%3D%22en-US%22%3E%3CP%3EI%20recently%20implemented%20%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2Fkedacore%2Fkeda%2Fissues%2F2656%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3Ea%20change%20in%20KEDA%3C%2FA%3E%20(currently%20evaluated%20as%20a%20potential%20pull%20request)%2C%20consisting%20of%20leveraging%20managed%20identities%20in%20a%20more%20granular%20way%2C%20in%20order%20to%20adhere%20to%20the%20least%20privilege%20principle.%20While%20I%20was%20testing%20my%20changes%2C%20I%20wanted%20to%20use%20managed%20identities%20not%20only%20for%20KEDA%20itself%20but%20also%20for%20the%20Azure%20Functions%20I%20was%20using%20in%20my%20tests.%20I%20found%20out%20that%20although%20there%20are%20quite%20a%20few%20docs%20on%20the%20topic%2C%20none%20is%20targeting%20AKS%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-functions%2Ffunctions-bindings-storage-queue-trigger%3Ftabs%3Dcsharp%23identity-based-connections%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-functions%2Ffunctions-bindings-storage-queue-trigger%3Ftabs%3Dcsharp%23identity-based-connections%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-functions%2Ffunctions-reference%3Ftabs%3Dblob%23connecting-to-host-storage-with-an-identity-preview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-functions%2Ffunctions-reference%3Ftabs%3Dblob%23connecting-to-host-storage-with-an-identity-preview%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EYou%20can%20find%20many%20articles%20showing%20how%20to%20grab%20a%20token%20from%20an%20HTTP%20triggered%20function%2C%20or%20using%20identity-based%20triggers%2C%20but%20in%20the%20context%20of%20a%20function%20hosted%20in%20Azure%20itself.%20It's%20not%20rocket%20science%20to%20make%20this%20work%20in%20AKS%20but%20I%20thought%20it%20was%20a%20good%20idea%20to%20recap%20it%20here%20as%20I%20couldn't%20find%20anything%20on%20that.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%225%22%3EQuick%20intro%20to%20managed%20identities%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3EHere%20is%20a%20quick%20reminder%20for%20those%20who%20would%20still%20not%20know%20about%20MI.%20The%20value%20proposition%20of%20MI%20is%3A%20no%20password%20in%20code%20(or%20config).%20MI%20are%20considered%20best%20practices%20because%20the%20credentials%20used%20by%20identities%20are%20entirely%20managed%20by%20Azure%20itself.%20Workloads%20can%20%3CEM%3Erefer%20to%3C%2FEM%3E%20identities%20without%20the%20need%20to%20store%20credentials%20anywhere.%20On%20top%20of%20this%2C%20you%20can%20manage%20authorization%20with%20Azure%20AD%20(single%20pane%20of%20glasses)%2C%20unlike%20shared%20access%20signatures%20and%20alternate%20authorization%20methods.%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%225%22%3EAKS%20%26amp%3B%20MI%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3EFor%20MI%20to%20work%20in%20AKS%2C%20you%20need%20to%20enable%20them.%20You%20can%20find%20a%20comprehensive%20explanation%20on%20how%20to%20do%20this%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Faks%2Fuse-managed-identity%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3Ehere%3C%2FA%3E.%20In%20a%20nutshell%2C%20MI%20works%20the%20following%20way%20in%20AKS%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22aksnmi.png%22%20style%3D%22width%3A%20879px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F353247i1EBC070C411D57A9%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22aksnmi.png%22%20alt%3D%22aksnmi.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAn%20%3CSTRONG%3EAzureIdentity%3C%2FSTRONG%3E%20and%20%3CSTRONG%3EAzureIdentityBinding%3C%2FSTRONG%3E%20resource%20must%20be%20defined.%20They%20target%20a%20user-assigned%20identity%2C%20which%20is%20attached%20to%20the%20cluster's%20VM%20scale%20set.%20The%20identity%20can%20be%20referred%20to%20by%20deployments%20through%20the%20%3CEM%3E%3CSTRONG%3Eaadpodbinding%3C%2FSTRONG%3E%20%3C%2FEM%3Eannotation.%20The%20function%20(or%20anything%20else)%20container%20makes%20a%20call%20to%20the%20MI%20system%20endpoint%20%3CA%20href%3D%22http%3A%2F%2F169....which%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3Ehttp%3A%2F%2F169...%2C%20%3C%2FA%3Ethat%20is%20intercepted%20by%20the%20NMI%20pod%2C%20which%20in%20turn%2C%20performs%20a%20call%20to%20Azure%20Active%20Directory%20to%20get%20an%20access%20token%20for%20the%20calling%20container.%26nbsp%3B%20The%20calling%20container%20can%20present%20the%20returned%20token%20to%20the%20Azure%20resource%20to%20gain%20access.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%225%22%3EUsing%20the%20right%20packages%20for%20the%20function%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3EThe%20packages%20you%20have%20to%20use%20depend%20on%20the%20Azure%20resource%20you%20interact%20with.%20In%20my%20example%2C%20I%20used%20storage%20account%20queues%20as%20well%20as%20service%20bus%20queues.%20To%20leverage%20MI%20from%20within%20the%20function%2C%20you%20must%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3Euse%20the%26nbsp%3BMicrosoft.Azure.WebJobs.Extensions.Storage%20%26gt%3B%3D%205.0.0%3C%2FLI%3E%0A%3CLI%3Euse%20the%20Microsoft.Azure.WebJobs.Extensions.ServiceBus%20%26gt%3B%3D%205.0.0%3C%2FLI%3E%0A%3CLI%3Euse%20the%26nbsp%3BMicrosoft.NET.Sdk.Functions%20%26gt%3B%3D%204.1.0%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3ENote%20that%20the%20storage%20package%20is%20not%20really%20an%20option%20because%20Azure%20Functions%20need%20an%20Azure%20Storage%20account%20for%20the%20most%20part.%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%225%22%3EPassing%20the%20right%20settings%20to%20the%20function%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3EAzure%20functions%20takes%20their%20configuration%20from%20the%20local%20settings%20and%20from%20their%20host's%20configuration.%20When%20using%20Azure%20Functions%20hosted%20on%20Azure%2C%20we%20can%20simply%20use%20the%20function%20app%20settings.%20In%20AKS%2C%20this%20is%20slightly%20different%20as%20we%20have%20to%20pass%20the%20settings%20through%20a%20%3CSTRONG%3EConfigMap%3C%2FSTRONG%3E%20or%20a%20%3CSTRONG%3ESecret%3C%2FSTRONG%3E.%20To%20target%20both%20the%20Azure%20Storage%20account%20and%20the%20Service%20Bus%2C%20you'll%20have%20to%20define%20a%20secret%20like%20the%20following%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CDIV%3E%0A%3CDIV%3E%3CPRE%20class%3D%22lia-code-sample%20language-yaml%22%3E%3CCODE%3Edata%3A%0A%20%20AzureWebJobsStorage__accountName%3A%20%3CBASE64%20value%3D%22%22%20of%3D%22%22%20storage%3D%22%22%20account%3D%22%22%20name%3D%22%22%3E%0A%20%20ServiceBusConnection__fullyQualifiedNamespace%3A%20%3CBASE64%20value%3D%22%22%20of%3D%22%22%20the%3D%22%22%20service%3D%22%22%20bus%3D%22%22%20fqdn%3D%22%22%3E%20%0A%20%20FUNCTIONS_WORKER_RUNTIME%3A%20%3CBASE64%20value%3D%22%22%20of%3D%22%22%20the%3D%22%22%20function%3D%22%22%20language%3D%22%22%3E%0AapiVersion%3A%20v1%0Akind%3A%20Secret%0Ametadata%3A%0A%20%20name%3A%20%3CSECRET%20name%3D%22%22%3E%0A---%3C%2FSECRET%3E%3C%2FBASE64%3E%3C%2FBASE64%3E%3C%2FBASE64%3E%3C%2FCODE%3E%3C%2FPRE%3E%3C%2FDIV%3E%0A%3CDIV%3EIn%20the%20above%20example%2C%20I%20use%20the%20same%20storage%20account%20for%20my%20storage-queue%20trigger%20as%20well%20as%20the%20storage%20account%20that%20is%20required%20by%20functions%20to%20work.%20In%20case%20I%20was%20using%20a%20different%20storage%20account%20for%20the%20queue%20trigger%2C%20I'd%20declare%20an%20extra%20setting%20with%20the%20account%20name.%20The%20service%20bus%20queue-triggered%20function%20relies%20on%20the%20__fullyQualifiedNamespace%20to%20start%20listening%20to%20the%20service%20bus.%20Paradoxally%2C%20although%20I%20create%20a%20K8s%20secret%2C%20there%20is%20no%20secret%20information%20here%2C%20thanks%20to%20the%20MI.%3C%2FDIV%3E%0A%3CDIV%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CDIV%3EFor%20your%20reference%2C%20I'm%20pasting%20the%20entire%20YAML%20here%3A%3C%2FDIV%3E%0A%3CDIV%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CDIV%3E%3CPRE%20class%3D%22lia-code-sample%20language-yaml%22%3E%3CCODE%3Edata%3A%0A%20%20AzureWebJobsStorage__accountName%3A%20%3CBASE64%20value%3D%22%22%20of%3D%22%22%20the%3D%22%22%20storage%3D%22%22%20account%3D%22%22%20name%3D%22%22%3E%0A%20%20ServiceBusConnection__fullyQualifiedNamespace%3A%20%3CBASE64%20value%3D%22%22%20of%3D%22%22%20the%3D%22%22%20service%3D%22%22%20bus%3D%22%22%20fqdn%3D%22%22%3E%0A%20%20FUNCTIONS_WORKER_RUNTIME%3A%20%3CBASE64%20value%3D%22%22%20of%3D%22%22%20the%3D%22%22%20function%3D%22%22%20code%3D%22%22%3E%0AapiVersion%3A%20v1%0Akind%3A%20Secret%0Ametadata%3A%0A%20%20name%3A%20misecret%0A---%0AapiVersion%3A%20aadpodidentity.k8s.io%2Fv1%0Akind%3A%20AzureIdentity%0Ametadata%3A%0A%20%20name%3A%20storageandbushandler%0A%20%20annotations%3A%0A%20%20%20%20aadpodidentity.k8s.io%2FBehavior%3A%20namespaced%0Aspec%3A%0A%20%20type%3A%200%0A%20%20resourceID%3A%20%2Fsubscriptions%2F...%2FresourceGroups%2F...%2Fproviders%2FMicrosoft.ManagedIdentity%2FuserAssignedIdentities%2Fstorageandbushandler%0A%20%20clientID%3A%20%3CCLIENT%20id%3D%22%22%20of%3D%22%22%20the%3D%22%22%20user-assigned%3D%22%22%20identity%3D%22%22%3E%0A---%0AapiVersion%3A%20aadpodidentity.k8s.io%2Fv1%0Akind%3A%20AzureIdentityBinding%0Ametadata%3A%0A%20%20name%3A%20storageandbushandler-binding%20%20%0Aspec%3A%0A%20%20azureIdentity%3A%20storageandbushandler%0A%20%20selector%3A%20storageandbushandler%0A---%0AapiVersion%3A%20apps%2Fv1%0Akind%3A%20Deployment%0Ametadata%3A%0A%20%20name%3A%20busandstoragemessagehandlers%0A%20%20labels%3A%0A%20%20%20%20app%3A%20busandstoragemessagehandlers%20%20%20%20%0Aspec%3A%0A%20%20selector%3A%0A%20%20%20%20matchLabels%3A%0A%20%20%20%20%20%20app%3A%20busandstoragemessagehandlers%0A%20%20template%3A%0A%20%20%20%20metadata%3A%0A%20%20%20%20%20%20labels%3A%0A%20%20%20%20%20%20%20%20app%3A%20busandstoragemessagehandlers%0A%20%20%20%20%20%20%20%20aadpodidbinding%3A%20storageandbushandler%0A%20%20%20%20spec%3A%0A%20%20%20%20%20%20containers%3A%0A%20%20%20%20%20%20-%20name%3A%20secretlessfunc%0A%20%20%20%20%20%20%20%20image%3A%20stephaneey%2Fsecretlessfunc%3Adev%0A%20%20%20%20%20%20%20%20imagePullPolicy%3A%20Always%0A%20%20%20%20%20%20%20%20envFrom%3A%0A%20%20%20%20%20%20%20%20-%20secretRef%3A%0A%20%20%20%20%20%20%20%20%20%20%20%20name%3A%20misecret%0A---%3C%2FCLIENT%3E%3C%2FBASE64%3E%3C%2FBASE64%3E%3C%2FBASE64%3E%3C%2FCODE%3E%3C%2FPRE%3E%3C%2FDIV%3E%0A%3CDIV%3EYou%20can%20see%20that%20the%20secret%20is%20passed%20to%20the%20function%20through%20the%20%3CSTRONG%3EenvFrom%3C%2FSTRONG%3E%20attribute.%20If%20you%20want%20to%20give%20it%20a%20test%2C%20you%20can%20use%20the%20docker%20image%20I%20pushed%20to%20Docker%20Hub.%3C%2FDIV%3E%0A%3CDIV%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CDIV%3Eand%20the%20code%20of%20both%20functions%2C%20embedded%20in%20the%20above%20docker%20image%20(nothing%20special)%3A%3C%2FDIV%3E%0A%3CDIV%3E%3CPRE%20class%3D%22lia-code-sample%20language-csharp%22%3E%3CCODE%3E%5BFunctionName(%22StorageQueue%22)%5D%0A%20%20%20%20%20%20%20%20public%20void%20StorageQueue(%5BQueueTrigger(%22myqueue-items%22%2C%20Connection%20%3D%20%22AzureWebJobsStorage%22)%5Dstring%20myQueueItem%2C%20ILogger%20log)%0A%20%20%20%20%20%20%20%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20log.LogInformation(%24%22C%23%20Queue%20trigger%20function%20processed%3A%20%7BmyQueueItem%7D%22)%3B%0A%20%20%20%20%20%20%20%20%7D%0A%0A%20%20%20%20%20%20%20%20%5BFunctionName(%22ServiceBusQueue%22)%5D%0A%20%20%20%20%20%20%20%20public%20void%20ServiceBusQueue(%5BServiceBusTrigger(%22myqueue-items%22%2C%20Connection%20%3D%20%22ServiceBusConnection%22)%5D%20string%20myQueueItem%2C%20ILogger%20log)%0A%20%20%20%20%20%20%20%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20log.LogInformation(%24%22C%23%20Queue%20trigger%20function%20processed%3A%20%7BmyQueueItem%7D%22)%3B%0A%20%20%20%20%20%20%20%20%7D%3C%2FCODE%3E%3C%2FPRE%3E%3C%2FDIV%3E%0A%3CDIV%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CDIV%3EYou%20just%20need%20to%20make%20sure%20the%20connection%20string%20names%20you%20mention%20in%20the%20triggers%20correspond%20to%20the%20settings%20you%20specify%20in%20the%20K8s%20secret.%3C%2FDIV%3E%0A%3C%2FDIV%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-3248143%22%20slang%3D%22en-US%22%3E%3CP%3EThis%20article%20explains%20how%20to%20use%20managed%20identities%20(MI)%20from%20Azure%20Functions%20hosted%20in%20AKS.%20Surprisingly%2C%20I%20could%20not%20find%20any%20article%20explaining%20this%2C%20hence%20the%20reason%20why%20I%20decided%20to%20write%20one.%3C%2FP%3E%3C%2FLINGO-TEASER%3E
Co-Authors
Version history
Last update:
‎Mar 05 2022 07:51 AM
Updated by: