DanielSel / kustomize-plugin-vault

Kustomize (v3) Secret Generator Plugin for HashiCorp Vault

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

kustomize-plugin-vault

Kustomize (v3) Secret Generator Plugin for HashiCorp Vault

Install

Kustomize must be built with plugin support and must be exactly the same version that the plugin was compiled with. We therefore provide a kustomize binary with the correct version for the vault plugin for convenience.

  1. Download kustomize binary + SecretsFromVault.so
  2. Move kustomize binary somewhere in your path (e.g. /usr/local/bin)
  3. Move SecretsFromVault.so to ${HOME}/.config/kustomize/plugin/kustomize.rohde-schwarz.com/v1alpha1/secretsfromvault/SecretsFromVault.so

How to use

The plugin generates Kubernetes Secrets from KV Secrets in HashiCorp Vault. The target Vault server needs to be specified in the VAULT_ADDR environment variable

Authentication to Vault can be done using either of following environment variables:

  • VAULT_TOKEN: Directly specify the token used to access vault
  • (Coming Soon) VAULT_ROLE_ID and VAULT_SECRET_ID: Authenticate using Vault AppRole authentication
  • VAULT_LDAP_USER and VAULT_LDAP_PASSWORD: Hard-coded credentials from a Service Account in LDAP/AD

Example for secret generator resource:

apiVersion: kustomize.rohde-schwarz.com/v1alpha1
kind: SecretsFromVault
metadata:
  name: secret-one
type: Opaque
secrets:
  - path: path/to/secret/one
    key: key_one_in_vault_secret_one
    secretKey: KEY_ONE_IN_GENERATED_SECRET_ONE
  - path: path/to/secret/two
    key: key_seven_in_vault_secret_two
    secretKey: KEY_TWO_IN_GENERATED_SECRET_ONE

Note: Every SecretsFromVault resource generates exactly one Kubernetes secret from n Vault secrets and m secrets per key

How to reference it in your kustomization.yaml:

generators:
- secret-one.yaml

About

Kustomize (v3) Secret Generator Plugin for HashiCorp Vault


Languages

Language:Go 100.0%