Update Azure storage account access keys in HDInsight cluster
In this article, you learn how to rotate Azure Storage account access keys for the primary or secondary storage accounts in Azure HDInsight.
Directly rotating the access key on the storage side will make the HDInsight cluster inaccessible.
We're going to use an approach to rotate the primary and secondary access keys of the storage account in a staggered, alternating fashion to ensure HDInsight cluster is accessible throughout the process.
Here's an example of how to use primary and secondary storage access keys and set up rotation policies on them:
- Use access key1 on the storage account when creating HDInsight cluster.
- Set up rotation policy for access key2 every N day. As part of this rotation update, HDInsight to use access key1 and then rotate access key2 on storage account.
- Set up rotation policy for access key1 every N/2 day. As part of this rotation update, HDInsight to use access key2 and then rotate access key1 on storage account.
- With approach access key1 will be rotated N/2, 3N/2 etc. days and access key2 will be rotated N, 2N, 3N etc. days.
To set up periodic rotation of storage account keys, see Automate the rotation of a secret.
Update storage account access keys
Use Script Action to update the keys with the following considerations:
|Bash script URI||
ACCOUNTNAMEis the name of the storage account on the HDInsight cluster.
ACCOUNTKEYis the access key for
-pis optional. If specified, the key isn't encrypted and is stored in the core-site.xml file as plain text.
The preceding script directly updates the access key on the cluster side only and doesn't renew a copy on the HDInsight Resource provider side. Therefore, the script action hosted in the storage account will fail after the access key is rotated.
Workaround: Use SAS URIs for script actions or make the scripts publicly accessible.