-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vault Agent Auto-Auth Enhancement To Write Credentials #6275
Comments
We are looking at improving our Kubernetes integration generally but nothing to report yet. I believe you can accomplish what you are talking about using Vault Agent and Consul Template. Consul Template was updated in the last couple of days to support reading the token file that is output from Vault Agent and you can use that to write Vault secrets to a file. |
There is also an inofficial Vault-CRD which I know works for several people: https://github.com/DaspawnW/vault-crd |
@chrishoffman That would be awesome, vault + vault agent could potentially solve the problem of giving short-lived AWS credentials to Kubernetes pods without giving everything on the same node the same permissions - right now best AWS can suggest is to run things on different nodes and use taints to keep other things off the same node. |
Closing this since #7652 has been merged which addresses this issue. |
Is your feature request related to a problem? Please describe.
Vault agent auto-auth allows for automatic authentication in multiple environments and handles keeping the auth token fresh. This could be expanded on to handle pulling secrets and writing them to a configured sink automatically based on additional configuration.
Describe the solution you'd like
I’m going to focus on the use case of a deployment in Kubernetes for my description of a potential solution. As part of my deployment, I would specify configuration (eg as a config map) for the credentials I want to read from Vault and where I would like them mounted to in the pod(s) (container/file path). The agent would handle mounting these secrets in to the pod(s) and renewing the leases/regenerating the credentials as needed.
Describe alternatives you've considered
Writing a custom tool to manually handle renewing the auth token in addition to using the Vault go http sdk to read credentials and renew leases/regenerate the credentials as needed.
Perhaps there's a better way to store the credentials than in file(s)?
Explain any additional use-cases
I would imagine the solution I outlined above could be used in multiple environments, eg on AWS as well.
The text was updated successfully, but these errors were encountered: