You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If you want to pass your custom values file while installing the chart, you can find the values file [here](https://github.com/OT-CONTAINER-KIT/helm-charts/blob/main/charts/k8s-vault-webhook/values.yaml)
@@ -29,3 +29,13 @@ The available annotations for k8s vault webhook are:-
29
29
|`vault.opstree.secret.manager/secret-version`| Vault secret version (if using v2 secret engine) | Yes | - |
30
30
|`vault.opstree.secret.manager/use-secret-names-as-keys`| treat secret path ending with / as directory where secret name is the key and a single value in each | No | - |
31
31
|`vault.opstree.secret.manager/auth-path`| alternate kubernetes backend auth path | No |`auth/kubernetes/login`|
Let's try to create a deployment to inject secrets directly from AWS Secret Manager. For example, purpose we are taking mysql as deployment and then we will try to set mysql root password using k8s-vault-webhook.
4
+
5
+
We can use our [example](https://github.com/OT-CONTAINER-KIT/k8s-vault-webhook/tree/master/example) folder.
6
+
7
+
The environment variables will get substitute automatically, we just have to provide some custom annotations.
8
+
9
+
```yaml
10
+
template:
11
+
metadata:
12
+
labels:
13
+
app: k8s-aws-mysql
14
+
tier: mysql
15
+
annotations:
16
+
aws.opstree.secret.manager/enabled: "true"
17
+
aws.opstree.secret.manager/region: "us-west-2"
18
+
# Use this role-arn if cluster is configured in AWS
For integrating AWS Secret Manager with the K8s Vault Webhook, first we need to setup AWS Secret Manager inside AWS account.
4
+
5
+
Here we will talk about the integration of AWS Secret Manager inside Kubernetes.
6
+
7
+
## Secret Manager Setup
8
+
9
+
Login into the [AWS Management Console](https://console.aws.amazon.com/console/home?nc2=h_ct&src=header-signin) and select [AWS Secret Manager](https://aws.amazon.com/secrets-manager/) service.
10
+
11
+

12
+
13
+
Create a secret in the secret-manager and select the secret type `Other type of secrets` and specify the key value pairs with these details.
14
+
15
+
|**Key**|**Value**|
16
+
|-------|---------|
17
+
| MYSQL_ROOT_PASSWORD | awspassword |
18
+
19
+

20
+
21
+
You should provide and description as well to the secret.
22
+
23
+

24
+
25
+
Create the secret after all configuration to use it inside Kubernetes.
Copy file name to clipboardexpand all lines: docs/src/guide/secret-manager.md
+2
Original file line number
Diff line number
Diff line change
@@ -25,6 +25,8 @@ Vault comes with various pluggable components called secrets engines and authent
25
25
26
26
AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. The service enables you to easily rotate, manage, and retrieve database credentials, API keys, and other secrets throughout their lifecycle.
27
27
28
+

29
+
28
30
## Azure Key Vault
29
31
30
32
Azure Key Vault is cloud service to securely store and accessing credentials such as API Keys, passwords, certificates or cryptographic keys.
0 commit comments