Failure to create service connection between AKS and KV

Martin Calsyn 0 Reputation points
2025-11-21T13:11:59.3466667+00:00

Upon following the directions at https://learn.microsoft.com/en-us/azure/aks/csi-secrets-store-identity-access?tabs=azure-portal&pivots=access-with-service-connector, both the CLI and portal gui result in the error shown below. Please assist me in getting past this and creating the connection.

Error: Operation is not succeeded: Failed. {"code":"ExternalServiceError","message":"Execution failed. The extension operation failed with the following error: Error: [ InnerError: [Helm installation failed : : InnerError [release sc-extension failed, and has been uninstalled due to atomic being set: failed post-install: 1 error occurred:\n\t* job sc-job failed: BackoffLimitExceeded\n\n]]] occurred while doing the operation : [Create] on the config . For general troubleshooting visit: https://aka.ms/k8s-extensions-TSG .\nStatus: 200 (OK)\nErrorCode: ExtensionOperationFailed\n\nService request succeeded. Response content and headers are not included to avoid logging sensitive data.\n"}

Azure Kubernetes Service
Azure Kubernetes Service
An Azure service that provides serverless Kubernetes, an integrated continuous integration and continuous delivery experience, and enterprise-grade security and governance.
{count} votes

1 answer

Sort by: Most helpful
  1. Martin Calsyn 0 Reputation points
    2025-12-06T09:48:48.4366667+00:00

    So the answer (alluded to earlier, and confirmed in the 5-Dec comment by msft above) seems to be that this feature is not supported across the full set of Azure k8s nodes. That should be made clear in the learn.microsoft.com documentation to save us all a bit of time.

    It's disappointing that we are releasing Azure features like this that aren't available on the most cost and energy efficient node architectures, especially given the relatively simple fix of cross compiling for those architectures.

    So the solution here is "spend more", though I think another alternative that hasn't been mentioned is to use workload managed identities and associated RBAC to access the key vault.

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.