How to rotate DB connection credentials using AWS Secret Manager without restarting the KeyCloak pod

I have KeyCloak deployed in Kubernetes with external database. I am using AWS Secrets Manager to generate and automatically rotate secrets for my DB credentials (password).

From my research, when DB secret is rotated in Kubernetes, the KeyCloak pod needs a restart to fetch the new DB secret for creating database pool connections.

Is there any way to rotate the KeyCloak DB credentials without restarting the pod ?