Back to Azure Resource templates index <–
![]()
Update or add a secret to an existing Azure KeyVault. Used during release when a resource is created which exposes a secret.
Template Locations
Infrastructure As Code Advisor (Beta)
WAF-compliance
The WAF-compliance advisor validates templates based on the Well Architected Framework practices. Every day a GitHub Action updates the templates compliance data and lists the recomendations.
Sustainbility Advisor
The sustainability advisor is based on the Sogeti Cloud Reference Architecture with sustainble practices. These sustainble practices cover application code, cloud infrastructures and data. The global Sogeti community is continously evolving the sustainble practices and every day new and tuned are added. For cloud infrastructures the sustainble practices are automatically validated and reported below.
note: when 100% it can be that there is no sustainble practices yet for this Cloud infrastructure.
Online documentation
Template reference
Service description
Related Azure Resources
| Resource | Description | Automation |
|---|---|---|
| KeyVault | Creates a key vault for the storage of secrets, keys and certificates | ARM |
| KeyVault | Creates a key vault for the storage of secrets, keys and certificates | Bicep |
Requirements
- Resource group must been created with a valid name and location.
Input values
- kvtSecretValue: The secret value.
- kvtSecretName : The secret variable name.
Output values
Additional information
Update or add a secret to an existing Azure KeyVault. Used during release when a resource is created which exposes a secret. Make sure the deployment points to the resource group where the Key Vault is deployed. The KeyVault name is constructed from the resource group name.
A good practice is not to use ARM output variables to pass through this ARM template, it will be readable in the deployment logs. Better to use the variables capability of the release pipeline.
Compliance Advisor details
Resource Health Result
| Message | ResourceType | Severity |
|---|---|---|
| It is recommended to use tags for your resource, which is currently missing | Microsoft.KeyVault/vaults/secrets | 1 |
| To help other contributors understand the purpose of the resource, specify comments for each resource in the template | Microsoft.KeyVault/vaults/secrets | 1 |
| It is recommended to parameterized your tag and make it as object type | Microsoft.KeyVault/vaults/secrets | 1 |
TemplateParameterHealthResult
| Message | Severity |
|---|---|
| Define default values for parameters that aren't sensitive. By specifying a default value, it's easier to deploy the template, and users of your template see an example of an appropriate value i.e. kvtSecretValueRead More | 1 |
| It is recommended to make your parameter as camel case, wherever possible for i.e. kvtcustomnameRead More | 1 |
| Define default values for parameters that aren't sensitive. By specifying a default value, it's easier to deploy the template, and users of your template see an example of an appropriate value i.e. kvtcustomnameRead More | 1 |
| Define default values for parameters that aren't sensitive. By specifying a default value, it's easier to deploy the template, and users of your template see an example of an appropriate value i.e. kvtSecretNameRead More | 1 |
TemplateVariableHealthResult
| Message | Severity |
|---|---|
| It is recommended to make your variable as camel case, wherever possible for e.g. environmentRead More | 1 |
TemplateOthersHealthResult
| Message | Severity |
|---|---|
| Current schema version is not valid, Please change the version year to 2019-04-01 or greater | 2 |