Azure Key Vault: Configure Groundplex nodes
Configure Groundplex nodes for each Azure Key Vault.
A secrets-config.json node configuration file provides the information that the Groundplex nodes need to access secrets. This page describes how to create that file. The file requires a configuration object with a unique name for each Azure Key Vault.
Restart each Groundplex node after creating or updating the secrets-config.json file.
Tip: You can restrict the use of secrets to
accounts in a specific project space by adding the
project_space
setting to the
secrets-config.json file when you configure your Groundplex. - An Azure Key Vault set up with the required access policies and appropriate IAM roles assigned to the managed identities for the Groundplex nodes. Refer to Set up Azure configuration for details.
- Permissions to access, update, and restart the Groundplex nodes.
- The URI of your Key Vault: .
- For user-assigned managed identities, the client ID: .
-
Create a secrets-config.json file.
-
Copy the secrets-config.json file to the
appropriate folder on each Groundplex node VM:
- On a VM with the Linux OS: /etc/snaplogic
- On a Windows VM: \opt\snaplogic\etc
-
From the directory that contains the secrets-config.json file, restart the node:
- On a VM with the Linux OS:
jcc.sh restart
- On a VM with Windows OS:
jcc.bat restart
- On a VM with the Linux OS: