I have KeyCloak deployed in Kubernetes with external database. I am using AWS Secrets Manager to generate and automatically rotate secrets for my DB credentials (password).
From my research, when DB secret is rotated in Kubernetes, the KeyCloak pod needs a restart to fetch the new DB secret for creating database pool connections.
Is there any way to rotate the KeyCloak DB credentials without restarting the pod ?