I am getting error : " MountVolume.SetUp failed for volume "secrets-store01-inline" : kubernetes.io/csi: mounter.SetUpAt failed to get CSI client: driver name secrets-store.csi.k8s.io not found in the list of registered CSI drivers"

Harish Tamarana 5 Reputation points
2025-06-24T17:58:50.1233333+00:00

I have installed drivers and providers in my aks . All pods are running on all the nodes . I updated client id , tenant id and key vault details properly in my secretproviderclass yaml file . But i am facing issue with driver .

MountVolume.SetUp failed for volume "secrets-store01-inline" : kubernetes.io/csi: mounter.SetUpAt failed to get CSI client: driver name secrets-store.csi.k8s.io not found in the list of registered CSI drivers

Azure Kubernetes Service
Azure Kubernetes Service
An Azure service that provides serverless Kubernetes, an integrated continuous integration and continuous delivery experience, and enterprise-grade security and governance.
2,461 questions
{count} votes

2 answers

Sort by: Most helpful
  1. Anusree Nashetty 4,785 Reputation points Microsoft External Staff Moderator
    2025-06-24T20:52:48.47+00:00

    Hi Harish Tamarana,

    The error MountVolume.SetUp failed for volume "secrets-store01-inline": kubernetes.io/csi: mounter.SetUpAt failed to get CSI client: driver name secrets-store.csi.k8s.io not found in the list of registered CSI drivers means the Secrets Store CSI Driver (secrets-store.csi.k8s.io) is not properly installed or not registered with the kubelet on the node where the pod is scheduled. The error message is also about a missing secrets-store.csi.k8s.io driver in the pod events, then the Secrets Store CSI Driver pods aren't running on the node in which the application is running.Please try below troubleshooting steps:

    Retrieve the status of the Secret Store CSI Driver pod running on the same node by running the following command: If pod status isn't Running or any of the containers in this pod isn't in Ready state, then proceed to check the logs for this pod.

    kubectl get pod -l app=secrets-store-csi-driver -n kube-system -o wide
    

    Confirm that Azure Key Vault Secrets Provider add-on is enabled on your cluster:

    az aks show -g <aks-resource-group-name> -n <aks-name> --query 'addonProfiles.azureKeyvaultSecretsProvider'
    

    If the enabled flag is shown as true in the preceding output, the Azure Key Vault Secrets Provider add-on is enabled on your cluster. If the enabled flag is shown as false in the preceding output, the Azure Key Vault Secrets Provider add-on isn't enabled on your cluster. In this case, refer to Azure Key Vault Provider for Secrets Store CSI Driver GitHub documentation for further troubleshooting.

    Check the Secrets Store Provider and CSI Driver pod logs:
    Run this command to find the Secrets Store Provider and CSI Driver pods that run on the same node that your application pod runs on:

    kubectl get pod -l 'app in (secrets-store-provider-azure, secrets-store-csi-driver)' -n kube-system -o wide
    

    Run the kubectl logs command to view logs from the Secrets Store CSI Driver pod:

    kubectl logs -n kube-system <csi-driver-pod-name> -c secrets-store --since=1h | grep ^E
    

    For detailed information, please check: https://learn.microsoft.com/en-us/troubleshoot/azure/azure-kubernetes/extensions/troubleshoot-key-vault-csi-secrets-store-csi-driver

    If you have any further queries, let me know. If the information is helpful, please click on Upvote.

    1 person found this answer helpful.
    0 comments No comments

  2. Harish Tamarana 5 Reputation points
    2025-06-25T09:57:36.09+00:00

    Hi , thanks .
    But its resolved , i think it was failing because we enabled azure secret provider on aks , but it was expecting helm installed csi driver store . i installed the csi driver using helm and it did the trick.

    1 person found this answer helpful.
    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.