Уреди

Делите путем


Receive and respond to key vault notifications with Azure Event Grid

Azure Key Vault integration with Azure Event Grid enables user notification when the status of a secret stored in a key vault has changed. For an overview of this feature, see Monitoring Key Vault with Event Grid.

This guide describes how to receive Key Vault notifications through Event Grid, and how to respond to status changes through Azure Automation.

Prerequisites

Concepts

Event Grid is an eventing service for the cloud. By following the steps in this guide, you'll subscribe to events for Key Vault and route events to Automation. When one of the secrets in the key vault is about to expire (defined as 30 days before expiration date), Event Grid is notified of the status change and makes an HTTP POST to the endpoint. A web hook then triggers an Automation execution of a PowerShell script.

HTTP POST flowchart

Create an Automation account

Create an Automation account through the Azure portal:

  1. Go to portal.azure.com and log in to your subscription.

  2. In the search box, enter Automation Accounts.

  3. Under the Services section of the drop-down list on the search bar, select Automation Accounts.

  4. Select Add.

    Automation accounts pane

  5. Enter the required information in the Add Automation Account pane and then select Create.

Create a runbook

After your Automation account is ready, create a runbook.

Create a runbook UI

  1. Select the Automation account you created.

  2. Select Runbooks under Process Automation.

  3. Select Create a runbook.

  4. Name your runbook and select PowerShell as the runbook type.

  5. Select the runbook you created and then select the Edit button.

  6. Enter the following code (for testing purposes) and select the Publish button. This action returns the result of the POST request received.

param
(
[Parameter (Mandatory = $false)]
[object] $WebhookData
)

#If runbook was called from Webhook, WebhookData will not be null.
if ($WebhookData) {

#rotate secret:
#generate new secret version in key vault
#update db/service with generated secret

#Write-Output "WebhookData <$WebhookData>"
Write-Output $WebhookData.RequestBody
}
else
{
# Error
write-Error "No input data found." 
}

Publish runbook UI

Create a webhook

Create a webhook to trigger your newly created runbook.

  1. Select Webhooks from the Resources section of the runbook you published.

  2. Select Add Webhook.

    Add Webhook button

  3. Select Create new Webhook.

  4. Name the webhook, set an expiration date, and copy the URL.

    Important

    You can't view the URL after you create it. Make sure you save a copy in a secure location where you can access it for the remainder of this guide.

  5. Select Parameters and run settings and then select OK. Don't enter any parameters. The Create button will be enabled.

  6. Select OK and then select Create.

    Create new Webhook UI

Create an Event Grid subscription

Create an Event Grid subscription through the Azure portal.

  1. Go to your key vault and select the Events tab.

    Events tab in Azure portal

  2. Select the Event Subscription button.

  3. Create a descriptive name for the subscription.

  4. Choose Event Grid Schema.

  5. Topic Resource should be the key vault you want to monitor for status changes.

  6. For Filter to Event Types, leave all options selected (9 selected).

  7. For Endpoint Type, select Webhook.

  8. Choose Select an endpoint. In the new context pane, paste the webhook URL from the Create a webhook step into the Subscriber Endpoint field.

  9. Select Confirm Selection on the context pane.

  10. Select Create.

    Create event subscription

Test and verify

Verify that your Event Grid subscription is properly configured. This test assumes you have subscribed to the "Secret New Version Created" notification in the Create an Event Grid subscription, and that you have the necessary permissions to create a new version of a secret in a key vault.

Test config of Event Grid subscription

Create-a-secret pane

  1. Go to your key vault on the Azure portal.

  2. Create a new secret. For testing purposes, set the expiration to date to the next day.

  3. On the Events tab in your key vault, select the Event Grid subscription you created.

  4. Under Metrics, check whether an event was captured. Two events are expected: SecretNewVersion and SecretNearExpiry. These events validate that Event Grid successfully captured the status change of the secret in your key vault.

    Metrics pane: check for captured events

  5. Go to your Automation account.

  6. Select the Runbooks tab, and then select the runbook you created.

  7. Select the Webhooks tab, and confirm that the "last triggered" time stamp is within 60 seconds of when you created the new secret. This result confirms that Event Grid made a POST to the webhook with the event details of the status change in your key vault and that the webhook was triggered.

    Webhooks tab, Last Triggered time stamp

  8. Return to your runbook and select the Overview tab.

  9. Look at the Recent Jobs list. You should see that a job was created and that the status is complete. This confirms that the webhook triggered the runbook to start executing its script.

    Webhook Recent Jobs list

  10. Select the recent job and look at the POST request that was sent from Event Grid to the webhook. Examine the JSON and make sure that the parameters for your key vault and event type are correct. If the "event type" parameter in the JSON object matches the event that occurred in the key vault (in this example, Microsoft.KeyVault.SecretNearExpiry), the test was successful.

Troubleshooting

You can't create an event subscription

Reregister Event Grid and the key vault provider in your Azure subscription resource providers. See Azure resource providers and types.

Next steps

Congratulations! If you've correctly followed all these steps, you're now ready to programmatically respond to status changes of secrets stored in your key vault.

If you've been using a polling-based system to search for status changes of secrets in your key vaults, you can now start using this notification feature. You can also replace the test script in your runbook with code to programmatically renew your secrets when they're about to expire.

Learn more: