content large_stringlengths 3 20.5k | url large_stringlengths 54 193 | branch large_stringclasses 4
values | source large_stringclasses 42
values | embeddings listlengths 384 384 | score float64 -0.21 0.65 |
|---|---|---|---|---|---|
establish a TLS connection, but you must set the [`api\_addr`](/vault/docs/configuration#api\_addr) parameter in your Vault configuration so manually registered plugins can establish communication with the Vault server at mount time. If the storage backend has HA enabled and supports automatic host address detection (e... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/plugins/plugin-architecture.mdx | main | vault | [
-0.014349161647260189,
0.0035952050238847733,
-0.060718487948179245,
0.016315937042236328,
-0.07182971388101578,
-0.07613357156515121,
-0.10288867354393005,
-0.010165249928832054,
0.05629391595721245,
0.006268012337386608,
0.0021048649214208126,
0.03076409175992012,
0.030246810987591743,
0... | -0.066034 |
# Plugin runtime settings ## Plugin environment variables An advantage for external plugins over builtin plugins is they can specify additional environment variables because they are run in their own process. -> Vault 1.16.0 changed the precedence given to plugin-specific environment variables so they take priority ove... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/plugins/plugin-management.mdx | main | vault | [
0.042637355625629425,
0.006928456015884876,
-0.0666864737868309,
-0.07482429593801498,
-0.0405169278383255,
-0.04556766152381897,
-0.04908904433250427,
0.012829187326133251,
-0.02158397063612938,
0.00032335438299924135,
0.0324593186378479,
-0.01699768751859665,
0.007389547768980265,
0.0861... | -0.107429 |
# The Vault plugin ecosystem Plugins act as building blocks in Vault that help you control how data moves through your environment and how clients access that data. Vault supports the following plugin types: - \*\*`auth`\*\* plugins handle authentication flows and allow clients to authenticate to Vault. - \*\*`secret`\... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/plugins/index.mdx | main | vault | [
-0.008259589783847332,
-0.03300613537430763,
-0.07664553821086884,
-0.0213699359446764,
-0.009813465178012848,
-0.05476371571421623,
-0.056841958314180374,
-0.041970375925302505,
0.0451846718788147,
-0.037406157702207565,
0.037179864943027496,
0.03804914280772209,
0.019905932247638702,
-0.... | -0.012893 |
- \*\*`aws`\*\* is version 1.18.5 of a built-in, embedded plugin. - \*\*`mykv`\*\* is version 1.0.0 of an external plugin. - \*\*`testkv`\*\* is an unversioned external plugin. ```shell-session $ vault plugin list secret Name Version ---- ------- aws v1.18.5+builtin.vault azure v0.20.1+builtin gcp v0.20.1+builtin gcpkm... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/plugins/index.mdx | main | vault | [
-0.042833175510168076,
0.05880522355437279,
-0.04409537836909294,
-0.048056598752737045,
0.0883069634437561,
-0.024654366075992584,
-0.005190341733396053,
-0.027539780363440514,
0.11137616634368896,
0.10780686885118484,
0.10210105776786804,
-0.0671885684132576,
0.03579947352409363,
0.02785... | -0.01403 |
# Event notifications development in Vault plugins @include 'alerts/enterprise-only.mdx' ~> Advanced topic! Plugin development is a highly advanced topic in Vault, and is not required knowledge for day-to-day usage. If you don't plan on writing any plugins, we recommend not reading this section of the documentation. [E... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/plugins/plugin-development-event-notifications.mdx | main | vault | [
0.06639695912599564,
-0.004292893689125776,
-0.06305745989084244,
-0.041690558195114136,
0.01849276013672352,
-0.044818200170993805,
0.018864721059799194,
-0.028084667399525642,
0.07960379868745804,
-0.06557048857212067,
0.023609044030308723,
-0.019682740792632103,
0.014152091927826405,
0.... | 0.016418 |
what edition of Vault they are connected to and should generate events regardless. ## Examples Here are some examples of adding event notifications to the KV and database plugins in Vault: - https://github.com/hashicorp/vault-plugin-secrets-kv/pull/88 - https://github.com/hashicorp/vault/pull/24718 | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/plugins/plugin-development-event-notifications.mdx | main | vault | [
0.030289234593510628,
-0.003109120763838291,
-0.0811341255903244,
-0.0054042586125433445,
-0.02309400960803032,
0.008393621072173119,
-0.0694228857755661,
-0.024518292397260666,
0.0906883031129837,
-0.05326509475708008,
0.018137723207473755,
-0.0294652096927166,
0.024794340133666992,
0.033... | 0.013003 |
# Plugin development ~> Advanced topic! Plugin development is a highly advanced topic in Vault, and is not required knowledge for day-to-day usage. If you don't plan on writing any plugins, we recommend not reading this section of the documentation. Because Vault communicates to plugins over a RPC interface, you can bu... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/plugins/plugin-development.mdx | main | vault | [
-0.07534901797771454,
-0.04550924524664879,
-0.07539468258619308,
-0.024652043357491493,
-0.06986735761165619,
-0.0457342267036438,
-0.05222319811582565,
0.034393277019262314,
-0.03482593595981598,
-0.012313613668084145,
0.022944755852222443,
-0.005498197395354509,
0.017451176419854164,
0.... | 0.031903 |
advantage of the SDK's [default logger](https://github.com/hashicorp/vault/blob/fe55cbbf05586ec4c0cd9bdf865ec6f741a8933c/sdk/framework/backend.go#L437). No additional setup is required. The logger can be used like the following: ```go func (b \*backend) example() { b.Logger().Trace("Trace level log") b.Logger().Debug("... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/plugins/plugin-development.mdx | main | vault | [
0.05195634067058563,
0.04675613343715668,
-0.11256646364927292,
-0.01795940101146698,
0.029028572142124176,
-0.09772098064422607,
-0.0196455679833889,
0.04870293661952019,
0.03575461357831955,
-0.034924548119306564,
0.04207678139209747,
-0.05384945869445801,
0.05061669647693634,
0.03325535... | 0.009395 |
# Upgrade plugins Upgrading a plugin in the catalog affects all uses of that plugin version. For example, if you have 5 different `customkv` mounts using v1.0.0 and you upgrade to v1.1.0, all the existing mounts will use the new binary if you overwrite it. We recommend treating plugin versions in the catalog as immutab... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/plugins/upgrade.mdx | main | vault | [
0.006306237541139126,
-0.048532675951719284,
0.022993795573711395,
-0.0556090846657753,
0.000020068506273673847,
-0.05011841282248497,
-0.0736735463142395,
-0.03273913264274597,
-0.0008163036545738578,
0.011570235714316368,
0.06585633754730225,
0.019923746585845947,
-0.0297786183655262,
0.... | -0.034373 |
# Add a containerized secrets plugin to Vault Run your external secrets plugins in containers to increases the isolation between the plugin and Vault. ## Before you start - \*\*Your Vault instance must be running on Linux\*\*. - \*\*Your Vault instance must have local access to the Docker Engine API\*\*. Vault uses the... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/plugins/containerized-plugins/add-a-containerized-plugin.mdx | main | vault | [
-0.022550327703356743,
-0.003723238129168749,
-0.05523759499192238,
-0.04310525953769684,
0.021312586963176727,
-0.07206360995769501,
-0.05492814630270004,
0.03846701234579086,
-0.016048911958932877,
0.003287781961262226,
0.03731922060251236,
-0.027511022984981537,
0.016061371192336082,
0.... | -0.067221 |
secret my-kv-container ``` 1. Enable the new plugin for your Vault instance with `vault secrets enable` and the new plugin ID: ```shell-session $ vault secrets enable NEW\_PLUGIN\_ID ``` For example: ```shell-session $ vault secrets enable my-kv-container ``` You can provide additional information about the image entry... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/plugins/containerized-plugins/add-a-containerized-plugin.mdx | main | vault | [
0.018904106691479683,
0.01803463324904442,
-0.05040865018963814,
0.011012070812284946,
-0.007956488057971,
-0.0045747035183012486,
-0.043088942766189575,
0.0603075735270977,
-0.010607006959617138,
0.0292704775929451,
0.05351640656590462,
-0.11357180029153824,
0.028891989961266518,
0.076938... | -0.060755 |
# Containerized plugins overview Support for the `container` runtime is currently limited to Linux. Vault has a wide selection of builtin plugins to support integrating with other systems. For example, you can use plugins to exchange app identity information with an authentication service to receive a Vault token, or m... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/plugins/containerized-plugins/index.mdx | main | vault | [
0.023998942226171494,
-0.03214510530233383,
-0.05659625306725502,
-0.021993404254317284,
-0.011765839532017708,
-0.03309931978583336,
-0.05997283011674881,
0.06407856196165085,
0.005181405693292618,
-0.0057017127983272076,
-0.009355118498206139,
-0.01794535480439663,
0.014257773756980896,
... | 0.019713 |
plugin containers can use the "plugin runtime" APIs for finer grained settings. See the CLI documentation for [`vault plugin runtime`](/vault/docs/commands/plugin/runtime) for more details. | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/plugins/containerized-plugins/index.mdx | main | vault | [
0.04256359115242958,
0.01968354359269142,
-0.0815420150756836,
-0.0036798003129661083,
-0.05242596194148064,
-0.08745456486940384,
-0.06938798725605011,
0.03241608291864395,
-0.06133992597460747,
-0.040424395352602005,
-0.011546268127858639,
-0.009245168417692184,
0.030656222254037857,
-0.... | 0.030341 |
# Run Vault as a service Instead of starting your Vault server manually from the command line, you can configure a service to start Vault automatically. ## Before you start - \*\*You must install Vault\*\*. You can [use a package manager](/vault/install) or [install a binary manually](/vault/docs/install/install-binary... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/run-as-service.mdx | main | vault | [
0.06680066883563995,
-0.028272230178117752,
-0.07794243097305298,
-0.07129114121198654,
-0.06811853498220444,
-0.0176127590239048,
-0.08340584486722946,
0.020305978134274483,
0.006782961543649435,
-0.007746357005089521,
-0.012240944430232048,
0.012709232978522778,
0.03734535351395607,
0.08... | -0.09577 |
```powershell Start-Service -Name MS\_VAULT ``` 1. Confirm service status: ```powershell Get-Service -Name MS\_VAULT Status Name DisplayName ------ ---- ----------- Running MS\_VAULT Vault Service ``` ## Step 3: Verify the service is running To confirm the service is running and your Vault service is available, open th... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/run-as-service.mdx | main | vault | [
0.07041073590517044,
-0.02844858728349209,
-0.07110780477523804,
-0.02699292078614235,
0.015873603522777557,
-0.04676579311490059,
-0.04027201235294342,
-0.05594322085380554,
-0.029326708987355232,
-0.02209116332232952,
0.024328500032424927,
-0.03618351370096207,
0.052410874515771866,
0.04... | -0.06243 |
# Why use TLS? You can enhance the overall security posture of your Vault cluster when you secure communications with TLS to ensure that data transmitted between Vault nodes and clients remains confidential and tamper-proof. @include 'ld-images/deploy/secure-vault-tls.mdx' Use mutual TLS with your Vault cluster deploym... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/why-use-tls.mdx | main | vault | [
-0.007531245704740286,
0.10375545173883438,
0.01374566089361906,
-0.07075382769107819,
-0.013547574169933796,
-0.041319381445646286,
0.01062984112650156,
-0.019188521429896355,
0.06497424095869064,
-0.0453890822827816,
-0.020471304655075073,
0.04479129612445831,
0.15214447677135468,
0.0210... | 0.00853 |
# Run Vault on IBM z/OS Container Extensions (zCX) Deploy a fully secured 3-node HashiCorp Vault Enterprise cluster on IBM z/OS Container Extensions (zCX). ## Before you start - \*\*Read about [sealing and unsealing](/vault/docs/concepts/seal) Vault\*\*. You cannot test your deployment without unsealing Vault. - \*\*In... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/run-as-zcx-cluster.mdx | main | vault | [
-0.00518299313262105,
0.058734387159347534,
-0.08122394979000092,
-0.03474747762084007,
-0.01427858043462038,
-0.06257141381502151,
-0.05958506837487221,
0.014388545416295528,
-0.03960886225104332,
-0.06113579496741295,
0.0037420769222080708,
-0.038118574768304825,
0.09392613917589188,
-0.... | 0.026029 |
: volumes: - vault-config:/vault/config env\_file: - path: required: true networks: - build: include: - path: ``` For example: ```yaml name: zcx services: vault-base: volumes: - vault-config:/vault/config env\_file: - path: ./vault.env required: true networks: - vault\_cluster build: include: - path: ../shared-deploy/c... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/run-as-zcx-cluster.mdx | main | vault | [
0.034878771752119064,
0.024523405358195305,
-0.08000655472278595,
-0.0049588666297495365,
0.01351223886013031,
-0.050546757876873016,
-0.012480934150516987,
0.03673875704407692,
-0.009298081509768963,
-0.023412765935063362,
-0.0033371723257005215,
-0.039573635905981064,
0.06968777626752853,
... | -0.044749 |
--- plugin\_directory = "/vault/plugins/" plugin\_tmpdir = "/vault/plugins/tmp" # --- Listener configuration --- listener "tcp" { address = "[::]:8200" tls\_disable = "false" tls\_cert\_file = "/vault/config/certs/vault.pem" tls\_key\_file = "/vault/config/certs/vault.key" tls\_client\_ca\_file = "/vault/config/certs/c... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/run-as-zcx-cluster.mdx | main | vault | [
-0.01740489900112152,
0.07951183617115021,
-0.04775771126151085,
0.016180071979761124,
0.0018743985565379262,
-0.04066759720444679,
-0.004098489414900541,
-0.004702369682490826,
0.03620224818587303,
-0.03281831741333008,
0.023156121373176575,
-0.06418274343013763,
0.10505898296833038,
0.04... | -0.035296 |
timeout client 1m timeout server 1m log global # --- Stats Page (HTTPS) --- frontend stats bind \*:8404 ssl crt /usr/local/etc/haproxy/haproxy.pem mode http stats enable stats uri /stats stats refresh 10s stats admin if TRUE # --- Vault API Frontend (TLS Passthrough) --- frontend vault\_api bind \*:8200 # Listen on Vau... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/run-as-zcx-cluster.mdx | main | vault | [
-0.023758213967084885,
0.11922822892665863,
-0.11246079951524734,
0.005859456956386566,
-0.02993273176252842,
-0.08016427606344223,
-0.058027978986501694,
0.01624212972819805,
0.0038853471633046865,
-0.021765513345599174,
-0.051975708454847336,
0.011974546127021313,
0.08791674673557281,
-0... | -0.055071 |
# Vault Lambda extension AWS Lambda lets you run code without provisioning and managing servers. The [Vault Lambda Extension](https://github.com/hashicorp/vault-lambda-extension) utilizes the AWS Lambda Extensions API to help your Lambda function read secrets from your Vault deployment. You can use the [quick-start](ht... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/aws/lambda-extension.mdx | main | vault | [
-0.017610082402825356,
0.0316629558801651,
-0.10218583047389984,
-0.0040365238673985004,
-0.03348323330283165,
-0.06387165933847427,
-0.03188147023320198,
0.02273915521800518,
0.05596419423818588,
0.02171887829899788,
0.01557666901499033,
-0.01629338413476944,
0.05573556199669838,
-0.00734... | -0.028731 |
authenticate as. Must be configured for the ARN of your Lambda's role. ```shell-session $ VAULT\_AUTH\_ROLE=vault-lambda-role ``` The path to a secret in Vault. Can be static or dynamic. Unless VAULT\_SECRET\_FILE is specified, JSON response will be written to `/tmp/vault/secret.json`. ```shell-session $ VAULT\_SECRET\... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/aws/lambda-extension.mdx | main | vault | [
-0.026305226609110832,
0.07929681986570358,
-0.11418028920888901,
-0.029962023720145226,
-0.042652398347854614,
-0.05977717787027359,
-0.004475461784750223,
0.05076133832335472,
0.028858453035354614,
-0.021473251283168793,
0.01694255881011486,
0.01568152755498886,
0.0018404952716082335,
0.... | -0.069155 |
exactly as described in the [Vault Commands (CLI)](/vault/docs/commands#environment-variables) documentation. However, note that `VAULT\_CLIENT\_TIMEOUT` cannot extend the timeout beyond the 10s initialization timeout imposed by the Extensions API when writing files to disk. | Environment variable | Description | Requi... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/aws/lambda-extension.mdx | main | vault | [
0.07254038006067276,
0.05561727285385132,
-0.05153530463576317,
-0.009250732138752937,
-0.011152776889503002,
-0.05309031903743744,
-0.09426575899124146,
0.00835676584392786,
0.03786299750208855,
-0.04528113082051277,
0.024551037698984146,
-0.013817586936056614,
0.04870138317346573,
-0.018... | -0.097373 |
where caching makes sense without negative impact in others. To turn on caching, set the environment variable `VAULT\_DEFAULT\_CACHE\_TTL` to a valid value that is parsable as a time.Duration in Go, for example, "15m", "1h", "2m3s" or "1h2m3s", depending on application needs. An invalid or negative value will be treate... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/aws/lambda-extension.mdx | main | vault | [
0.022229420021176338,
0.06071789935231209,
-0.03776603937149048,
-0.006711719557642937,
-0.042375560849905014,
-0.1026865616440773,
0.0012531756656244397,
-0.04358644038438797,
0.08512888848781586,
0.0007189273019321263,
0.008343272842466831,
0.06674171984195709,
0.017201049253344536,
-0.0... | -0.107239 |
related statistics to help assess the cost impact of this extension. Note that AWS Lambda allocates [CPU power in proportion to memory](https://docs.aws.amazon.com/lambda/latest/dg/configuration-memory.html) so results will vary widely. These benchmarks were run with the minimum 128MB of memory allocated so aim to give... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/aws/lambda-extension.mdx | main | vault | [
-0.023382939398288727,
0.022485895082354546,
-0.09278978407382965,
0.039460863918066025,
-0.009141121059656143,
-0.002829300006851554,
-0.03295298293232918,
0.04922350123524666,
0.008393615484237671,
0.007765295449644327,
0.007833348587155342,
0.0072919330559670925,
-0.00023742177290841937,
... | -0.017726 |
# Running Vault ## Launching the Vault AMI When Vault is first launched from an official Marketplace AMI, it will come up in an uninitialized state and must be initialized via the [API](/vault/api-docs/system/init), [CLI](/vault/docs/commands/operator/init), or UI. The Marketplace AMI listens on port 8200 by default. I... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/aws/run.mdx | main | vault | [
0.03214956447482109,
0.024640250951051712,
-0.03565449267625809,
-0.046560563147068024,
-0.02652948535978794,
-0.046055544167757034,
-0.034738779067993164,
0.03731555864214897,
0.020857244729995728,
-0.023217253386974335,
0.04048721119761467,
-0.01584473066031933,
0.06630297005176544,
0.05... | 0.025579 |
# Kubernetes integrations comparison HashiCorp Vault provides three different integrations to help Kubernetes workloads consume secrets from Vault without modifying application code. Each integration has unique characteristics that make it suitable for different use cases. Use the information below to compare the avail... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/comparisons.mdx | main | vault | [
0.014548555947840214,
0.050921086221933365,
-0.03214170038700104,
-0.05992812663316727,
-0.03282683715224266,
-0.04635060951113701,
-0.056248247623443604,
0.006034357938915491,
0.05585520714521408,
-0.04660943150520325,
0.024333538487553596,
-0.008144374005496502,
0.024383608251810074,
-0.... | 0.068729 |
between integrations based on their architectural patterns. - \*\*Vault Secrets Operator\*\* - Lowest load due to CRD-specific connections and cluster-local secret caching. Single manager for an entire cluster. - \*\*Vault Secrets Operator with CSI driver\*\* - Lower load due to one Vault connection pool per Node, with... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/comparisons.mdx | main | vault | [
0.025015614926815033,
-0.005985544994473457,
-0.01237508561462164,
-0.02902223728597164,
-0.014534393325448036,
-0.038949571549892426,
-0.004837264306843281,
0.01626787707209587,
0.030303511768579483,
0.007221775595098734,
0.04146683216094971,
0.001232530572451651,
0.037966612726449966,
-0... | 0.191774 |
# Migrate Consul to Raft storage This procedure assumes you have a Vault cluster deployed in a Kubernetes environment configured with Consul storage. The storage migration can occur while leaving the Consul cluster intact. A single change to the Consul cluster is a lock file written by Vault during the migration. This ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/consul-to-raft.mdx | main | vault | [
-0.000661956612020731,
-0.0009301744867116213,
-0.052689433097839355,
-0.049399878829717636,
0.012153935618698597,
-0.04776957258582115,
-0.07111170142889023,
0.0033768818248063326,
0.0017780994530767202,
0.04761650785803795,
0.036343030631542206,
0.0024012625217437744,
0.026770412921905518,... | 0.008395 |
# Run Vault on Kubernetes Vault can be deployed into Kubernetes using the official HashiCorp Vault Helm chart. The Helm chart allows users to deploy Vault in various configurations: - Dev: a single in-memory Vault server for testing Vault - Standalone (default): a single Vault server persisting to a volume using the fi... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/index.mdx | main | vault | [
0.04336364567279816,
-0.01752614416182041,
-0.0320260114967823,
-0.07181814312934875,
-0.054985374212265015,
-0.020144883543252945,
-0.08593934774398804,
0.03551851958036423,
0.08434051275253296,
-0.0064674485474824905,
-0.0011800677748396993,
0.017278172075748444,
0.04000693932175636,
-0.... | 0.134008 |
# Vault Agent Injector vs. Vault CSI Provider This document explores two different methods for integrating HashiCorp Vault with Kubernetes. The information provided is intended for DevOps practitioners who understand secret management concepts and are familiar with HashiCorp Vault and Kubernetes. This document also off... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/injector-csi.mdx | main | vault | [
0.005997569765895605,
0.0739874467253685,
-0.03578304126858711,
-0.014201619662344456,
-0.009852342307567596,
-0.005042249336838722,
0.0026749451644718647,
0.00006788635801058263,
0.058055903762578964,
0.03572814539074898,
0.036983318626880646,
0.018491026014089584,
0.059430789202451706,
0... | 0.152025 |
vary in size. You need to consider the secret types your application requires and how they’re projected into the application. - \*\*Secret definition:\*\* You also need to consider how each secret is defined, created, updated, and removed, as well as the tooling associated with that process. - \*\*Encryption:\*\* Encry... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/injector-csi.mdx | main | vault | [
-0.02993607148528099,
-0.016063267365098,
0.0279989130795002,
-0.05645855888724327,
-0.050106991082429886,
0.0035733345430344343,
0.011799332685768604,
0.02743607945740223,
0.07406537234783173,
0.013004034757614136,
-0.044590286910533905,
-0.003624943783506751,
0.001477800658904016,
-0.057... | 0.126955 |
considerations: - The Sidecar Agent Injector solution is composed of two elements: - The Sidecar Service Injector, which is deployed as a cluster service and is responsible for intercepting Kubernetes apiserver pod events and mutating pod specs to add required sidecar containers - The Vault Sidecar Container, which is ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/injector-csi.mdx | main | vault | [
0.010010129772126675,
0.06230172887444496,
-0.022345231845974922,
-0.029580898582935333,
0.01937255635857582,
-0.013196500949561596,
-0.01049551647156477,
0.021996958181262016,
-0.004710048902779818,
0.006003239192068577,
0.06448262184858322,
-0.015861615538597107,
0.02783057652413845,
0.0... | 0.151731 |
they are running. ## Summary Designing secrets management in Kubernetes is an intricate task. There are multiple approaches, each with its own set of attributes. We recommend exploring the options presented in this document to increase your understanding of the internals and decide on the best option for your use case.... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/injector-csi.mdx | main | vault | [
0.010696048848330975,
0.033933646976947784,
-0.015573753975331783,
-0.022559819743037224,
-0.016443422064185143,
-0.03233819082379341,
-0.04186360910534859,
-0.02798343263566494,
0.03892185539007187,
0.014883177354931831,
0.04212530329823494,
-0.0011150377104058862,
-0.0010818848386406898,
... | 0.115379 |
# Vault Secrets Store CSI provider examples The following examples demonstrate common uses of the Vault Secrets Store CSI provider. ## File based dynamic database credentials The following Secret Provider Class retrieves dynamic database credentials from Vault and extracts the generated username and password. The secre... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/csi/examples.mdx | main | vault | [
-0.027800559997558594,
0.009948499500751495,
-0.06945358961820602,
-0.009184688329696655,
-0.03689996153116226,
-0.023605866357684135,
0.019287554547190666,
0.04283244162797928,
0.046430058777332306,
0.023880653083324432,
0.02769201062619686,
-0.00040797385736368597,
0.07194937765598297,
0... | 0.03416 |
# Vault Secrets Store CSI provider The Vault Secrets Store CSI provider allows pods to consume Vault secrets using [Secrets Store CSI](https://github.com/kubernetes-sigs/secrets-store-csi-driver) volumes. ~> The Vault Secrets Store CSI provider requires the [CSI Secret Store](https://github.com/kubernetes-sigs/secrets-... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/csi/index.mdx | main | vault | [
-0.012935607694089413,
0.0006407419568859041,
0.003877258626744151,
-0.005338489543646574,
0.016308074817061424,
-0.005063645076006651,
0.020451780408620834,
-0.002524596406146884,
0.08968901634216309,
0.02349686436355114,
0.044572196900844574,
0.025953680276870728,
0.028493143618106842,
-... | 0.130178 |
app: demo replicas: 1 template: spec: serviceAccountName: app containers: - name: app image: my-app:1.0.0 volumeMounts: - name: 'vault-db-creds' mountPath: '/mnt/secrets-store' readOnly: true volumes: - name: vault-db-creds csi: driver: 'secrets-store.csi.k8s.io' readOnly: true volumeAttributes: secretProviderClass: 'v... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/csi/index.mdx | main | vault | [
0.012098211795091629,
0.03193594515323639,
-0.02154230885207653,
-0.0649079754948616,
-0.015332250855863094,
-0.015490989200770855,
-0.030113065615296364,
0.04491294175386429,
0.08125913143157959,
0.0193310659378767,
0.025139734148979187,
-0.053985774517059326,
0.08129938691854477,
0.02247... | -0.00779 |
# Vault Secrets Store CSI provider configurations The following command line arguments are supported by the Vault Secrets Store CSI provider. Most settings support being set by, in ascending order of precedence: - Environment variables - Command line arguments - Secret Provider Class parameters If installing via the he... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/csi/configurations.mdx | main | vault | [
0.04647138714790344,
0.02510596066713333,
-0.06579847633838654,
-0.03250183165073395,
-0.026887742802500725,
-0.07834532856941223,
-0.03882940113544464,
0.03397540748119354,
0.04613181948661804,
0.006826428230851889,
0.03550434485077858,
0.03291282802820206,
0.058885589241981506,
0.0244609... | 0.004537 |
installing the helm chart. The Helm chart installs Vault Agent as a sidecar to the Vault Secrets Store CSI provider for caching and renewals. Setting `vaultAddress` here causes the Vault Secrets Store CSI provider to bypass the Vault Agent cache. - `vaultNamespace` `(string: "")` - The Vault [namespace](/vault/docs/ent... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/csi/configurations.mdx | main | vault | [
-0.020211273804306984,
0.03961459919810295,
-0.04457099363207817,
-0.040055613964796066,
-0.006105242297053337,
-0.06033594533801079,
-0.09903090447187424,
-0.003967329394072294,
0.032274357974529266,
-0.018528901040554047,
0.027111466974020004,
-0.0067255375906825066,
0.1171758770942688,
... | -0.116405 |
# Install the Vault Secrets Store CSI provider ## Prerequisites - Kubernetes 1.16+ for both the master and worker nodes (Linux-only) - [Secrets Store CSI driver](https://secrets-store-csi-driver.sigs.k8s.io/getting-started/installation.html) installed. - `TokenRequest` endpoint available, which requires setting the fla... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/csi/installation.mdx | main | vault | [
0.014464863575994968,
0.012858959846198559,
0.01113987248390913,
-0.06737380474805832,
-0.042908262461423874,
-0.016254939138889313,
-0.06969421356916428,
-0.0009016924304887652,
0.06498847901821136,
0.047458216547966,
-0.004364500287920237,
-0.03524754196405411,
0.05430542305111885,
0.003... | 0.092589 |
# Vault Secrets Operator examples The Operator project provides the following examples: - Sample use-cases are documented [here](https://github.com/hashicorp/vault-secrets-operator#samples) - A Terraform based demo can be found [here](https://github.com/hashicorp/vault-secrets-operator/tree/main/demo) ## JWT auth for K... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/examples.mdx | main | vault | [
-0.0012013032101094723,
0.07984151691198349,
-0.014072091318666935,
-0.036245010793209076,
-0.02666037529706955,
-0.047566406428813934,
-0.03595893830060959,
-0.014490569941699505,
0.06135321781039238,
-0.011721731163561344,
-0.02263566665351391,
-0.027214238420128822,
0.050696808844804764,
... | 0.069061 |
# Vault Secrets Operator Helm chart configuration The chart is customizable using [Helm configuration values](https://helm.sh/docs/intro/using\_helm/#customizing-the-chart-before-installing). ## Top-Level Stanzas Use these links to navigate to a particular top-level stanza. - [`controller`](#h-controller) - [`metricsSe... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/helm.mdx | main | vault | [
0.015183919109404087,
0.05786664038896561,
-0.03828879073262215,
-0.08366809785366058,
-0.051487330347299576,
-0.024306632578372955,
-0.03673211857676506,
0.019714655354619026,
0.02361285872757435,
0.009125061333179474,
0.05253288894891739,
-0.039297111332416534,
0.042668018490076065,
-0.0... | 0.017444 |
- "HCPAuth" - `userFacingRoles` ((#v-controller-rbac-clusterroleaggregation-userfacingroles)) (`object: ""`) - userFacingRoles is a map of roles that will be aggregated into the viewer and editor ClusterRoles. See https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles for more information. - `v... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/helm.mdx | main | vault | [
0.037363115698099136,
-0.023931484669446945,
-0.04307324066758156,
0.07415521889925003,
-0.0010045248782262206,
0.11609804630279541,
-0.010489381849765778,
-0.03766566514968872,
0.04671843722462654,
0.04391568899154663,
-0.018949978053569794,
-0.10591842979192734,
0.022191844880580902,
-0.... | 0.068716 |
operator search for a "default" VaultAuthGlobal if none is specified on the referring VaultAuth CR. Default: true - `backoffOnSecretSourceError` ((#v-controller-manager-backoffonsecretsourceerror)) (`object: ""`) - Backoff settings for the controller manager. These settings control the backoff behavior when the control... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/helm.mdx | main | vault | [
-0.021560063585639,
0.04471582546830177,
-0.07803867012262344,
0.045206449925899506,
-0.020280810073018074,
-0.001401127316057682,
-0.05925992876291275,
-0.032100047916173935,
-0.005870063789188862,
-0.03396948426961899,
0.04100773110985756,
0.00012963802146259695,
0.023817094042897224,
-0... | -0.107126 |
configured when client cache persistence with encryption is enabled and will deploy an additional VaultAuthMethod to be used by the Vault Transit Engine. E.g. when `controller.manager.clientCache.persistenceModel=direct-encrypted` Supported Vault authentication methods for the Transit Auth method are: jwt, appRole, aws... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/helm.mdx | main | vault | [
0.01499142311513424,
0.011442573741078377,
-0.06104244291782379,
0.016440341249108315,
-0.0035544265992939472,
0.018799126148223877,
-0.029414428398013115,
-0.03946748375892639,
0.06470046192407608,
-0.00913450587540865,
0.006963575724512339,
-0.00102220568805933,
0.055749326944351196,
0.0... | -0.045888 |
Vault Auth Role to use This is a required field and must be setup in Vault prior to deploying the helm chart if using the AWS for the Transit auth method. - `region` ((#v-controller-manager-clientcache-storageencryption-aws-region)) (`string: ""`) - AWS region to use for signing the authentication request Optional, but... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/helm.mdx | main | vault | [
0.06782008707523346,
0.10886311531066895,
-0.08447272330522537,
-0.03790731355547905,
0.017719384282827377,
0.014807689934968948,
0.0240724366158247,
0.004495126660913229,
0.06260421127080917,
0.01689903624355793,
0.018787525594234467,
-0.10933662950992584,
0.0875559076666832,
0.0228219814... | -0.041644 |
at /var/run/podinfo. User-defined volumes cannot override this. Example: ```yaml volumes: - name: approle-secret secret: secretName: my-approle-secret defaultMode: 0400 - name: tls-certs configMap: name: vault-tls ``` - `resources` ((#v-controller-manager-resources)) (`map`) - Configures the default resources for the v... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/helm.mdx | main | vault | [
0.048744287341833115,
0.06378739327192307,
0.046434685587882996,
-0.026901356875896454,
-0.049476590007543564,
-0.046863459050655365,
-0.026333218440413475,
0.0030571846291422844,
0.059803593903779984,
0.010527833364903927,
-0.056965701282024384,
-0.02384914644062519,
-0.009799452498555183,
... | 0.022982 |
(`boolean: false`) - toggles the deployment of the VaultAuthMethod CR - `namespace` ((#v-defaultauthmethod-namespace)) (`string: ""`) - Vault namespace for the VaultAuthMethod CR - `allowedNamespaces` ((#v-defaultauthmethod-allowednamespaces)) (`array: []`) - Kubernetes namespace glob patterns which are allow-listed fo... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/helm.mdx | main | vault | [
0.020800767466425896,
0.05089243873953819,
-0.03563448414206505,
-0.052768364548683167,
-0.005084597039967775,
-0.011263353750109673,
-0.03156627342104912,
-0.04595351219177246,
0.015783580020070076,
-0.00806337222456932,
0.05268355458974838,
-0.0697859451174736,
0.03997012972831726,
0.026... | -0.012518 |
STS endpoint to use; if not set will use the default - `iamEndpoint` ((#v-defaultauthmethod-aws-iamendpoint)) (`string: ""`) - The IAM endpoint to use; if not set will use the default - `secretRef` ((#v-defaultauthmethod-aws-secretref)) (`string: ""`) - The name of a Kubernetes Secret which holds credentials for AWS. S... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/helm.mdx | main | vault | [
-0.024227075278759003,
0.025778746232390404,
-0.025974491611123085,
-0.033803168684244156,
-0.06654487550258636,
0.044600386172533035,
0.08052372932434082,
-0.016943294554948807,
0.11734377592802048,
0.10721135884523392,
0.014163346961140633,
-0.11763426661491394,
0.02519591525197029,
-0.0... | 0.140453 |
common to all hooks. - `limits` ((#v-hooks-resources-limits)) - `cpu` ((#v-hooks-resources-limits-cpu)) (`string: 500m`) - `memory` ((#v-hooks-resources-limits-memory)) (`string: 128Mi`) - `requests` ((#v-hooks-resources-requests)) - `cpu` ((#v-hooks-resources-requests-cpu)) (`string: 10m`) - `memory` ((#v-hooks-resour... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/helm.mdx | main | vault | [
0.0042320359498262405,
0.08470217883586884,
-0.0376659519970417,
-0.013645132072269917,
0.05487549304962158,
-0.0014879165682941675,
-0.08304973691701889,
0.010216438211500645,
-0.04650849476456642,
0.012180608697235584,
0.020778821781277657,
-0.016383865848183632,
-0.049664635211229324,
-... | 0.042517 |
in milliseconds (e.g. 1695382800000) - nano - Unix timestamp in nanoseconds (e.g. 1695382800000000000) - iso8601 - ISO 8601 format (e.g. 2023-09-22T10:00:00Z) - rfc3339 - RFC 3339 format (e.g. 2023-09-22T10:00:00Z) - rfc3339nano - RFC 3339 format with nanosecond precision (e.g. 2023-09-22T10:00:00.123456789Z) Default: ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/helm.mdx | main | vault | [
0.011007653549313545,
-0.02480849251151085,
-0.05765044316649437,
0.004172299988567829,
0.041777513921260834,
-0.060525014996528625,
-0.08178439736366272,
0.07194219529628754,
0.0327860563993454,
-0.0057648057118058205,
0.048199284821748734,
-0.04244791716337204,
-0.04095086082816124,
-0.0... | 0.10743 |
the `default` ServiceAccount. ```yaml # config.yaml defaultVaultConnection: enabled: true defaultAuthMethod: enabled: true ``` ## Customizing the helm chart If you need to extend the Helm chart with additional options, we recommend using a third-party tool, such as [kustomize](https://github.com/kubernetes-sigs/kustomi... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/helm.mdx | main | vault | [
0.051120296120643616,
0.06585244089365005,
-0.03014228120446205,
-0.0467817559838295,
-0.06983307749032974,
0.0034339423291385174,
-0.05823906511068344,
0.02103540487587452,
0.05710321664810181,
-0.0007572483737021685,
0.039453621953725815,
-0.01914121024310589,
0.035012003034353256,
0.018... | 0.002444 |
# Vault Secrets Operator The Vault Secrets Operator (VSO) allows Pods to consume Vault secrets natively from Kubernetes Secrets. The Vault Secrets Operator (VSO) is a fully supported component of HashiCorp Vault. ## Overview The Vault Secrets Operator operates by watching for changes to its supported set of Custom Reso... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/index.mdx | main | vault | [
0.010451249778270721,
0.033057425171136856,
-0.023765811696648598,
-0.017482634633779526,
0.0007662143325433135,
-0.03379309922456741,
-0.018774956464767456,
-0.01135176420211792,
0.07167400419712067,
0.013489252887666225,
0.034908074885606766,
-0.005733815487474203,
0.01848590560257435,
-... | 0.169143 |
# Vault Secrets Operator telemetry The Vault Secrets Operator is instrumented with Prometheus metrics in the following ways: \* The operator will emit the default controller-runtime metrics as outlined in the [monitoring](https://book-v1.book.kubebuilder.io/beyond\_basics/controller\_metrics.html) \* Custom metrics rel... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/telemetry.mdx | main | vault | [
-0.0030200013425201178,
0.05408566817641258,
-0.057888537645339966,
-0.05109699070453644,
-0.09862867742776871,
-0.09109248220920563,
-0.025301525369286537,
0.016364803537726402,
0.07135836780071259,
-0.026523109525442123,
0.03149274364113808,
-0.069505974650383,
0.0062574720941483974,
-0.... | 0.162464 |
# API Reference ## Packages - [secrets.hashicorp.com/v1beta1](#secretshashicorpcomv1beta1) ## secrets.hashicorp.com/v1beta1 Package v1beta1 contains API Schema definitions for the secrets v1beta1 API group ### Resource Types - [CSISecrets](#csisecrets) - [CSISecretsList](#csisecretslist) - [HCPAuth](#hcpauth) - [HCPAut... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/api-reference.mdx | main | vault | [
-0.040023040026426315,
0.0345316007733345,
-0.07918687909841537,
-0.08077258616685867,
0.0027651910204440355,
-0.0018045713659375906,
-0.010191326029598713,
-0.036747343838214874,
-0.012292574159801006,
-0.06325028091669083,
0.032162755727767944,
-0.045019108802080154,
0.03919889032840729,
... | 0.063147 |
--- | | `containerState` \_[ContainerState](#containerstate)\_ | ContainerState is the state of the container that the CSI driver always sync on. This configuration is useful to sync when the last state of the container is in the terminated state and the restart count is greater than 0. | | | #### ContainerState \_Appe... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/api-reference.mdx | main | vault | [
-0.020374031737446785,
0.06324685364961624,
-0.02881265990436077,
-0.027852525934576988,
0.01534622348845005,
0.015872284770011902,
0.08163411170244217,
-0.025707153603434563,
0.004777413792908192,
-0.023553412407636642,
0.03517705574631691,
-0.04875010997056961,
0.08231481164693832,
0.023... | 0.184411 |
| Default | Validation | | --- | --- | --- | --- | | `organizationID` \_string\_ | OrganizationID of the HCP organization. | | | | `projectID` \_string\_ | ProjectID of the HCP project. | | | | `allowedNamespaces` \_string array\_ | AllowedNamespaces Kubernetes Namespaces which are allow-listed for use with this AuthMe... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/api-reference.mdx | main | vault | [
0.019288701936602592,
0.038488831371068954,
-0.023661458864808083,
-0.06640701740980148,
-0.08073687553405762,
-0.017021842300891876,
-0.006604878697544336,
-0.10252005606889725,
0.05722369998693466,
-0.03369944170117378,
-0.021682046353816986,
-0.060811903327703476,
0.08133351057767868,
0... | 0.018758 |
Vault Secrets App \_Appears in:\_ - [HCPVaultSecretsAppStatus](#hcpvaultsecretsappstatus) | Field | Description | Default | Validation | | --- | --- | --- | --- | | `name` \_string\_ | Name of the dynamic secret | | | | `createdAt` \_string\_ | CreatedAt is the timestamp string of when the dynamic secret was created | ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/api-reference.mdx | main | vault | [
-0.07415254414081573,
0.07788015156984329,
-0.10295996069908142,
-0.015677953138947487,
0.010313810780644417,
-0.002035736571997404,
0.022566070780158043,
0.008970205672085285,
0.06717737764120102,
-0.07708700746297836,
0.06413839757442474,
0.001208956935442984,
0.048761896789073944,
-0.05... | 0.014008 |
\_string\_ | Name of the resource | | | #### SecretCollection \_Appears in:\_ - [CSISecretsSpec](#csisecretsspec) | Field | Description | Default | Validation | | --- | --- | --- | --- | | `transformation` \_[Transformation](#transformation)\_ | Transformation provides configuration for transforming the secret data bef... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/api-reference.mdx | main | vault | [
-0.0649322047829628,
0.05721784010529518,
-0.13188627362251282,
-0.03373219445347786,
0.01360621489584446,
-0.016937825828790665,
0.058406464755535126,
0.01349857822060585,
0.002328737871721387,
-0.05158515274524689,
0.04546500742435455,
-0.04058671370148659,
0.08129525184631348,
-0.015365... | 0.079334 |
Vault. | | | | `keyName` \_string\_ | KeyName to use for encrypt/decrypt operations via Vault Transit. | | | #### SyncConfig SyncConfig configures sync behavior from Vault to VSO \_Appears in:\_ - [VaultStaticSecretSpec](#vaultstaticsecretspec) | Field | Description | Default | Validation | | --- | --- | --- | --- | | ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/api-reference.mdx | main | vault | [
-0.032870952039957047,
0.052632320672273636,
-0.033570826053619385,
0.031132051721215248,
0.00005725690789404325,
-0.00833350233733654,
0.003287182655185461,
-0.01503536757081747,
0.04273109883069992,
-0.04757171496748924,
0.020643122494220734,
-0.02432222291827202,
-0.01712966337800026,
-... | 0.097308 |
in this TransformationRef. If empty, then all templates from the SecretTransformation will be rendered to the K8s Secret. | | | | `ignoreIncludes` \_boolean\_ | IgnoreIncludes controls whether to use the SecretTransformation's Includes data key filters. | | | | `ignoreExcludes` \_boolean\_ | IgnoreExcludes controls whe... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/api-reference.mdx | main | vault | [
-0.04166501387953758,
0.1241423636674881,
-0.024176325649023056,
0.017297616228461266,
0.0054418849758803844,
0.0006530514219775796,
0.002078389283269644,
-0.014154668897390366,
0.044140007346868515,
-0.0392167866230011,
0.029512042179703712,
-0.11590038239955902,
0.08567755669355392,
-0.0... | -0.075322 |
`secretRef` \_string\_ | SecretRef is the name of a Kubernetes Secret in the consumer's (VDS/VSS/PKI) namespace which holds credentials for AWS. Expected keys include `access\_key\_id`, `secret\_access\_key`, `session\_token` | | | | `irsaServiceAccount` \_string\_ | IRSAServiceAccount name to use with IAM Roles for Se... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/api-reference.mdx | main | vault | [
-0.07332044094800949,
0.0431668646633625,
-0.029345110058784485,
-0.00965945515781641,
-0.003612461732700467,
-0.00024438370019197464,
0.046583179384469986,
-0.015964794903993607,
0.12483510375022888,
0.05403228849172592,
0.04463827610015869,
-0.08159907907247543,
0.040974073112010956,
-0.... | 0.089977 |
- [VaultAuthGlobalConfigKubernetes](#vaultauthglobalconfigkubernetes) - [VaultAuthSpec](#vaultauthspec) | Field | Description | Default | Validation | | --- | --- | --- | --- | | `role` \_string\_ | Role to use for authenticating to Vault. | | | | `serviceAccount` \_string\_ | ServiceAccount to use when authenticating ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/api-reference.mdx | main | vault | [
-0.0040300339460372925,
0.0006933034746907651,
-0.07495244592428207,
0.00015583068307023495,
-0.02787182852625847,
-0.003977277781814337,
0.011016713455319405,
0.023003969341516495,
0.033510465174913406,
-0.026866348460316658,
0.006132146809250116,
-0.04155205190181732,
0.07762512564659119,
... | -0.039463 |
should be specified. | | | | `namespace` \_string\_ | Namespace to auth to in Vault | | | | `mount` \_string\_ | Mount to use when authenticating to auth method. | | | | `params` \_object (keys:string, values:string)\_ | Params to use when authenticating to Vault | | | | `headers` \_object (keys:string, values:string)\... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/api-reference.mdx | main | vault | [
-0.018277358263731003,
0.020748065784573555,
-0.05960552394390106,
-0.016860542818903923,
-0.0446302704513073,
0.0005905802245251834,
0.0557030513882637,
-0.006287426222115755,
0.046444740146398544,
-0.026776893064379692,
0.011352552101016045,
-0.09828169643878937,
0.07429402321577072,
0.0... | 0.004569 |
| | | `tokenExpirationSeconds` \_integer\_ | TokenExpirationSeconds to set the ServiceAccount token. | 600 | Minimum: 600 | | `namespace` \_string\_ | Namespace to auth to in Vault | | | | `mount` \_string\_ | Mount to use when authenticating to auth method. | | | | `params` \_object (keys:string, values:string)\_ | Pa... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/api-reference.mdx | main | vault | [
-0.003467332571744919,
0.02632618322968483,
-0.11376270651817322,
-0.006003796122968197,
-0.048691146075725555,
-0.04394741356372833,
0.007161333691328764,
0.036592788994312286,
-0.009111525490880013,
-0.0681002140045166,
0.013896691612899303,
-0.043286263942718506,
0.09524902701377869,
0.... | -0.007017 |
method will be used. This can be used as a default Vault namespace for all auth methods. | | | | `defaultAuthMethod` \_string\_ | DefaultAuthMethod to use when authenticating to Vault. | | Enum: [kubernetes jwt appRole aws gcp] | | `defaultMount` \_string\_ | DefaultMount to use when authenticating to auth method. If n... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/api-reference.mdx | main | vault | [
0.0002558580308686942,
0.03059895522892475,
-0.03997126594185829,
-0.04632771015167236,
-0.0557144396007061,
-0.02080593816936016,
-0.008031191304326057,
0.011154661886394024,
0.05704275891184807,
-0.015201748348772526,
0.014985610730946064,
-0.05660368502140045,
0.07707799226045609,
-0.00... | -0.007511 |
this check. Accepted values: []{"\*"} - wildcard, all namespaces. []{"a", "b"} - list of namespaces. unset - disallow all namespaces except the Operator's the VaultAuthMethod's namespace, this is the default behavior. | | | | `method` \_string\_ | Method to use when authenticating to Vault. | | Enum: [kubernetes jwt ap... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/api-reference.mdx | main | vault | [
-0.0007544060354121029,
0.03647460415959358,
-0.010455080308020115,
-0.04618304595351219,
-0.031742267310619354,
-0.05133247748017311,
0.012246275320649147,
-0.07131964713335037,
0.056002020835876465,
-0.02876770682632923,
0.0021862778812646866,
-0.07634260505437851,
0.0937558114528656,
-0... | -0.027364 |
as the SNI host for TLS connections. | | | | `caCertSecretRef` \_string\_ | CACertSecretRef is the name of a Kubernetes secret containing the trusted PEM encoded CA certificate chain as `ca.crt`. CACertPath and CACertSecretRef are mutually exclusive, and only one should be specified. | | | | `caCertPath` \_string\_ | C... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/api-reference.mdx | main | vault | [
0.018212758004665375,
0.07338005304336548,
-0.0038735102862119675,
-0.02649136446416378,
-0.04230381175875664,
-0.03774254396557808,
-0.01684727519750595,
-0.0477784164249897,
0.1428350955247879,
-0.0197532307356596,
-0.01249916572123766,
-0.07200919091701508,
0.06172308698296547,
0.030435... | -0.000317 |
be ignored. See RequestHTTPMethod for more details. Please consult https://developer.hashicorp.com/vault/docs/secrets if you are uncertain about what 'params' should/can be set to. | | | | `renewalPercent` \_integer\_ | RenewalPercent is the percent out of 100 of the lease duration when the lease is renewed. Defaults t... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/api-reference.mdx | main | vault | [
0.003481775289401412,
0.04569131135940552,
-0.062017571181058884,
-0.029313810169696808,
-0.08472263067960739,
-0.03572651371359825,
-0.03671451658010483,
-0.03703781217336655,
0.055676914751529694,
-0.021632308140397072,
0.07771120965480804,
0.03275945782661438,
0.06289145350456238,
0.027... | -0.012765 |
Vault to use when issuing TLS certificates. | | | | `revoke` \_boolean\_ | Revoke the certificate when the resource is deleted. | | | | `clear` \_boolean\_ | Clear the Kubernetes secret when the resource is deleted. | | | | `expiryOffset` \_string\_ | ExpiryOffset to use for computing when the certificate should be ren... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/api-reference.mdx | main | vault | [
-0.012502294965088367,
0.12580999732017517,
-0.024114809930324554,
-0.0002619473380036652,
-0.043686963617801666,
-0.014001918025314808,
0.01593172363936901,
-0.017953483387827873,
0.13556896150112152,
-0.0380658395588398,
0.03401452675461769,
-0.0047453283332288265,
0.09290813654661179,
0... | 0.015975 |
format YYYY-MM-ddTHH:MM:SSZ | | | | `excludeCNFromSans` \_boolean\_ | ExcludeCNFromSans from DNS or Email Subject Alternate Names. Default: false | | | #### VaultSecretLease \_Appears in:\_ - [VaultDynamicSecretStatus](#vaultdynamicsecretstatus) | Field | Description | Default | Validation | | --- | --- | --- | --- | |... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/api-reference.mdx | main | vault | [
-0.025720451027154922,
0.08950742334127426,
-0.054997723549604416,
-0.01593894325196743,
-0.002148226136341691,
-0.025871720165014267,
0.010728285647928715,
-0.03447388857603073,
0.06074800342321396,
-0.041422657668590546,
-0.008408991619944572,
-0.07228707522153854,
0.04960179328918457,
-... | -0.050759 |
\_string\_ | `secrets.hashicorp.com/v1beta1` | | | | `kind` \_string\_ | `VaultStaticSecretList` | | | | `metadata` \_[ListMeta](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#listmeta-v1-meta)\_ | Refer to Kubernetes API documentation for fields of `metadata`. | | | | `items` \_[VaultStaticSecret... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/api-reference.mdx | main | vault | [
-0.0003662318049464375,
0.07569248974323273,
-0.036908481270074844,
-0.03985225409269333,
-0.04664422571659088,
-0.013238613493740559,
0.02112514339387417,
0.004397254902869463,
0.03912322223186493,
-0.03347836062312126,
-0.007983366958796978,
-0.06310798227787018,
0.030491193756461143,
-0... | 0.093235 |
# Run the Vault Secrets Operator on OpenShift The Vault Secrets Operator may be installed on OpenShift clusters via the embedded OperatorHub or the Helm chart. OpenShift versions 4.12 and later are supported. ## OperatorHub The Vault Secrets Operator is certified by Red Hat and therefore included in the [OperatorHub se... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/openshift.mdx | main | vault | [
0.0903610959649086,
0.046926870942115784,
-0.029989996924996376,
0.0031366620678454638,
0.017230866476893425,
0.008016197942197323,
-0.0760292038321495,
-0.01957709901034832,
0.03956936299800873,
-0.014630971476435661,
-0.010932321660220623,
-0.02387692779302597,
-0.008508143946528435,
-0.... | 0.041511 |
# Secret data transformation Utilizing advanced templating and data filters, the Vault Secrets Operator for Kubernetes (VSO) can transform source secret data, secret metadata, resource labels and annotations into a format that is compatible with your application. All secret data sources are supported. Secret transforma... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/secret-transformation.mdx | main | vault | [
-0.016036223620176315,
0.12444920837879181,
-0.03538115322589874,
-0.02813156321644783,
-0.01995832286775112,
0.015025319531559944,
-0.018665585666894913,
0.012960805557668209,
0.0777389332652092,
-0.04349730536341667,
0.016664374619722366,
-0.06497576832771301,
-0.006027012597769499,
0.00... | 0.125196 |
a secret CR or within the same resource instance. ```yaml --- apiVersion: secrets.hashicorp.com/v1beta1 kind: SecretTransformation metadata: name: vso-templates namespace: example-vds spec: excludes: - password|username templates: url: text: '{{- template "dbUrl" . -}}' sourceTemplates: - name: helpers text: | {{/\* cr... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/secret-transformation.mdx | main | vault | [
-0.06126946955919266,
0.06963126361370087,
-0.05294211953878403,
-0.01039937324821949,
-0.012838343158364296,
0.015037178061902523,
-0.012815632857382298,
0.03843632712960243,
0.007749087642878294,
-0.01579442247748375,
-0.008549168705940247,
-0.06972157210111618,
0.024294551461935043,
-0.... | 0.015686 |
@include 'vso/common-links.mdx' # Install and upgrade the Vault Secrets Operator ## Prerequisites - A Kubernetes cluster running 1.23+ - Helm 3.7+ - [Optional] Kustomize 4.5.7+ ## Installation using Helm [Install Helm](https://helm.sh/docs/intro/install) before beginning. The [Helm chart][helm] is the recommended way o... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/installation.mdx | main | vault | [
0.06028267368674278,
0.027290603145956993,
-0.0027021626010537148,
-0.05188971385359764,
-0.01774083450436592,
-0.011912927031517029,
-0.10562601685523987,
-0.0062373303808271885,
0.02051233872771263,
0.02191053330898285,
0.01963067054748535,
-0.039941199123859406,
0.005239803344011307,
0.... | 0.045095 |
the Helm chart uses to cleanup resources and remove finalizers on the uninstall path. Please see [`config/samples`](https://github.com/hashicorp/vault-secrets-operator/tree/main/config/samples) or `config/samples` in the downloaded release artifacts for additional resources. ## Upgrade using Kustomize Upgrading using K... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/installation.mdx | main | vault | [
0.04859153926372528,
0.08559087663888931,
0.03734296187758446,
-0.08427713811397552,
0.014152209274470806,
-0.04330095648765564,
-0.1325116753578186,
0.026503203436732292,
-0.004904245492070913,
0.01403125375509262,
0.04404373839497566,
-0.012246961705386639,
-0.032961469143629074,
-0.0436... | 0.03603 |
# Use protected secrets in Kubernetes with CSI @include 'alerts/enterprise-only.mdx' While the Vault Secrets Operator lets you store Vault secrets in clusters as native Kubernetes Secrets, you must install the Vault Secrets Operator [CSI driver](https://github.com/container-storage-interface/spec/blob/master/spec.md) t... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/csi/index.mdx | main | vault | [
0.03162631765007973,
0.030622979626059532,
-0.023731499910354614,
-0.021055230870842934,
0.007465464062988758,
-0.010843693278729916,
-0.004138478543609381,
0.007179467473179102,
0.09389609843492508,
0.029051290825009346,
0.0024750486481934786,
-0.013968193903565407,
0.05596896633505821,
-... | 0.111888 |
# Set up the Vault Secrets Operator CSI driver @include 'alerts/enterprise-only.mdx' Use the Vault Secrets Operator CSI driver with a `CSISecrets` resource to allow authorized Pods to mount ephemeral volumes containing secrets from Vault as indexed files. Indexing starts at `0` and represents the associated position in... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/csi/setup.mdx | main | vault | [
0.023024728521704674,
-0.015369769185781479,
-0.07063406705856323,
-0.015121723525226116,
-0.018668003380298615,
-0.02807515114545822,
0.004814609419554472,
0.008593421429395676,
0.05466100573539734,
-0.015614868141710758,
0.00977681390941143,
-0.007629635743796825,
0.07969220727682114,
0.... | 0.117256 |
the CSISecrets resource To securely sync secrets between Vault and your application Pods, you must create a custom resource called `CSISecrets` that lists information available to the CSI driver Pods. For example, the following resource definition creates a single `CSISecrets` resource that can: - Generate secret IDs f... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/csi/setup.mdx | main | vault | [
-0.00414279056712985,
0.020291823893785477,
-0.07296808809041977,
-0.0019271837081760168,
-0.022521991282701492,
-0.03225688263773918,
0.007938183844089508,
0.036040350794792175,
0.03501264750957489,
-0.029693661257624626,
0.028326554223895073,
-0.08403573930263519,
0.07578690350055695,
0.... | 0.080459 |
# Troubleshooting the Vault Secrets Operator CSI driver ## Driver not appearing in cluster Verify that you have enabled it with the `csi.enabled` field on the Vault Secrets Operator Helm chart. You can do this by either adding the field to your `values.yaml` file, or by passing it directly with the `--set` flag: ```she... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/csi/troubleshooting.mdx | main | vault | [
0.09743182361125946,
-0.015850454568862915,
-0.010927902534604073,
-0.05271809175610542,
0.01784244365990162,
-0.030014611780643463,
-0.07047851383686066,
0.017847035080194473,
0.05020381510257721,
0.03710518777370453,
0.05221296846866608,
-0.050275690853595734,
0.044515009969472885,
0.075... | 0.042455 |
secret ID for subsequent logins to Vault, you have to set up the [AppRole auth method](/vault/docs/auth/approle) in Vault ahead of time. If you see errors when logging into Vault with your secret ID, verify the following: - If using response-wrapping, the wrapping token's TTL has not expired. - If using response-wrappi... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/csi/troubleshooting.mdx | main | vault | [
-0.015775218605995178,
0.04896777868270874,
-0.025384623557329178,
-0.004262784030288458,
0.006917533930391073,
-0.07492155581712723,
-0.03463400900363922,
0.031160244718194008,
0.05233107879757881,
-0.0159438569098711,
0.03127548471093178,
-0.00343437516130507,
0.05502820387482643,
0.0753... | -0.04172 |
@include '../../../global/partials/alerts/hvs-eof-notice.mdx' # Vault Secrets Operator with HCP Vault Secrets The Vault secrets operator (VSO) syncs your [HCP Vault Secrets app](/hcp/docs/vault-secrets) (HVSA) to a Kubernetes Secret. Vault syncs each `HCPVaultSecretsApp` custom resource periodically to ensure that chan... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/sources/hvs.mdx | main | vault | [
0.009272292256355286,
0.06490551680326462,
0.02908376045525074,
-0.068011574447155,
-0.0011578104458749294,
0.03840356320142746,
-0.01631893217563629,
-0.012267704121768475,
0.05166212469339371,
-0.03724263608455658,
-0.006973791867494583,
-0.041245173662900925,
0.06490252166986465,
-0.061... | 0.09968 |
@include 'vso/common-links.mdx' # Vault Secrets Operator The Vault Secrets Operator (VSO) supports Vault as a secret source, which lets you seamlessly integrate VSO with a Vault instance running on any platform. The Vault Secrets Operator (VSO) is a fully supported component of HashiCorp Vault. ## Supported Vault platf... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/sources/vault/index.mdx | main | vault | [
-0.02121025137603283,
0.030340176075696945,
-0.04953055828809738,
-0.055144403129816055,
0.012719860300421715,
-0.025780804455280304,
-0.11162595450878143,
-0.003623134223744273,
-0.02480694092810154,
-0.07615968585014343,
0.011926627717912197,
0.013353333808481693,
0.07708676159381866,
-0... | 0.049852 |
configuration that can be inherited by multiple `VaultAuth` custom resources. It supports multiple authentication methods and allows you to define a default authentication method that can be overridden by individual VaultAuth custom resources. See `vaultAuthGlobalRef` in the [VaultAuth spec][va-spec] for more details. ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/sources/vault/index.mdx | main | vault | [
0.001698015257716179,
0.024575937539339066,
-0.04530387371778488,
-0.038103558123111725,
-0.07272715866565704,
-0.015953760594129562,
0.014073665253818035,
-0.010086036287248135,
0.08936953544616699,
-0.04383065551519394,
-0.07387761026620865,
-0.04808581620454788,
0.06873302906751633,
0.0... | 0.044625 |
of `VaultPKISecret` custom resource. Please consult [PKI Secrets Engine - Setup and Usage](/vault/docs/secrets/pki/setup) for configuring PKI secrets engine. The following results in a request to `http://127.0.0.1:8200/v1/pki/issue/default` to generate TLS certificates. ```yaml --- apiVersion: secrets.hashicorp.com/v1b... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/sources/vault/index.mdx | main | vault | [
-0.02016514725983143,
0.059705134481191635,
-0.03632079064846039,
0.008348103612661362,
-0.05565556511282921,
-0.0737469270825386,
-0.03766618296504021,
-0.0281200110912323,
0.08596702665090561,
-0.03812561184167862,
0.013635634444653988,
-0.06656455248594284,
0.04265907034277916,
0.041112... | 0.000916 |
# Instant updates for a VaultStaticSecret Vault Secrets Operator (VSO) supports instant updates for [VaultStaticSecrets][vss-spec] by subscribing to event notifications from Vault. ## Before you start - \*\*You must have [Vault Secrets Operator](/vault/docs/platform/k8s/vso/sources/vault) installed\*\*. - \*\*You must ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/sources/vault/instant-updates.mdx | main | vault | [
0.03926480561494827,
0.03189817816019058,
-0.03426874428987503,
-0.011745331808924675,
-0.01745857670903206,
-0.03982812538743019,
-0.028778577223420143,
-0.024589508771896362,
0.049454059451818466,
-0.01696810871362686,
-0.01433658879250288,
-0.059055015444755554,
0.02655797265470028,
0.0... | -0.000725 |
# Persist and encrypt the Vault client cache By default, the [Vault client cache](/vault/docs/platform/k8s/vso/sources/vault#vault-client-cache) does not persist. You can use the [transit secrets engine](/vault/docs/secrets/transit) with Vault Secrets Operator (VSO) to store and encrypt the client cache in your Vault s... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/sources/vault/client-cache.mdx | main | vault | [
-0.01601538434624672,
0.04092656075954437,
0.0009393416694365442,
0.024676088243722916,
-0.0668763518333435,
-0.0029911191668361425,
-0.08201499283313751,
-0.016423342749476433,
0.0874573141336441,
0.0019303434528410435,
-0.017321281135082245,
0.01947150193154812,
0.000049394617235520855,
... | -0.010316 |
vault-secrets-operator \ -n vault-secrets-operator ``` The pod in the operator deployment restarts once the `VSO\_CLIENT\_CACHE\_PERSISTENCE\_MODEL` environment variable persists. ## Optional: Verify client cache storage and encryption 1. Confirm the Vault Secrets Operator logs the following information on startup: ```... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/sources/vault/client-cache.mdx | main | vault | [
0.019304834306240082,
0.056358594447374344,
-0.029074816033244133,
0.014644704759120941,
-0.033834733068943024,
-0.062081433832645416,
-0.006086514797061682,
-0.018031850457191467,
0.08215170353651047,
-0.014412994496524334,
0.00036562271998263896,
0.020748749375343323,
-0.001294649206101894... | -0.008914 |
# GCP auth support for Vault Secrets Operator The Vault Secrets Operator (VSO) supports authenticating to Vault's [GCP auth](/vault/docs/auth/gcp) method, using Google's Kubernetes Engine (GKE) workload identity. 1. Follow Google's [Use Workload Identity](https://cloud.google.com/kubernetes-engine/docs/how-to/workload-... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/sources/vault/auth/gcp.mdx | main | vault | [
-0.0252939872443676,
0.03648599609732628,
0.036397144198417664,
-0.06834954023361206,
-0.07215742766857147,
-0.001099016284570098,
0.043994106352329254,
-0.01056936290115118,
0.061236850917339325,
0.005999821703881025,
-0.020166026428341866,
-0.08444464951753616,
0.0649719089269638,
0.0089... | -0.001097 |
# AWS auth support for Vault Secrets Operator The Vault Secrets Operator (VSO) supports [AWS authentication](/vault/docs/auth/aws) when accessing Vault. VSO can retrieve AWS credentials: - from an [IRSA-enabled Kubernetes service account][aws-irsa]. - by inferring credentials from the underlying EKS node role. - by inf... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/sources/vault/auth/aws.mdx | main | vault | [
0.00819525308907032,
0.07233045995235443,
-0.043383195996284485,
-0.010730237700045109,
-0.02453235164284706,
-0.0145181305706501,
0.01531366165727377,
0.022787269204854965,
0.10812970995903015,
0.0032948909793049097,
-0.04669700935482979,
-0.02664877288043499,
0.029060108587145805,
0.0015... | 0.022311 |
@include 'vso/common-links.mdx' # Vault authentication in detail ## Auth configuration The Vault Secrets Operator (VSO) relies on `VaultAuth` resources to authenticate with Vault. It relies on credential providers to generate the credentials necessary for authentication. For example, when VSO authenticates to a kuberne... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/sources/vault/auth/index.mdx | main | vault | [
-0.019336000084877014,
-0.007004570681601763,
-0.022283729165792465,
-0.06161206215620041,
-0.007710269186645746,
-0.03278562054038048,
0.007763662375509739,
-0.021560272201895714,
0.09599605947732925,
-0.019599296152591705,
-0.05099787190556526,
-0.016222158446907997,
0.09841106086969376,
... | 0.06032 |
a `VaultAuth` and VaultStaticSecret resource in their application's namespace with the following configurations: Application 1 would have a configuration like this: ```yaml --- apiVersion: secrets.hashicorp.com/v1beta1 kind: VaultAuth metadata: name: app1 namespace: apps spec: kubernetes: role: app1 serviceAccount: app... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/sources/vault/auth/index.mdx | main | vault | [
0.012552439235150814,
-0.0028090630657970905,
-0.07276993244886398,
-0.05236944183707237,
-0.02625305764377117,
-0.05889129266142845,
-0.01169825904071331,
-0.01175953820347786,
0.058254677802324295,
-0.04621914401650429,
0.052625637501478195,
-0.05834061652421951,
0.06638125330209732,
0.0... | 0.031071 |
roles A Vault admin has configured a Kubernetes auth backend in Vault mounted at `kubernetes`. In addition, the Vault admin has configured a JWT auth backend mounted at `jwt`. The admin creates the necessary roles in Vault for each auth method. The admin expects to have two applications authenticate, one using `kuberne... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/sources/vault/auth/index.mdx | main | vault | [
0.004984870553016663,
-0.014370428398251534,
-0.01719573698937893,
-0.05669967085123062,
-0.03953079879283905,
-0.07055750489234924,
-0.0032409050036221743,
-0.025421105325222015,
0.0938856229186058,
-0.034249696880578995,
0.0028738698456436396,
-0.040006186813116074,
0.06379643082618713,
... | 0.017166 |
"default", "uid": "1dabe3a5-5479-4f5d-ac48-5db7eff7f822", "apiVersion": "secrets.hashicorp.com/v1beta1", "resourceVersion": "631994" }, "reason": "Accepted", "message": "Failed to handle VaultAuth resource request: err=failed getting admin/default, err=VaultAuthGlobal.secrets.hashicorp.com \"default\" not found", "sour... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/vso/sources/vault/auth/index.mdx | main | vault | [
0.05762161314487457,
0.04078692942857742,
-0.08490069210529327,
0.005193781107664108,
0.02339097484946251,
-0.04045991227030754,
-0.047380704432725906,
-0.02526315301656723,
0.0776377022266388,
-0.030371693894267082,
0.011224827729165554,
-0.051624905318021774,
0.031951189041137695,
0.0769... | -0.021915 |
# Configuration @include 'helm/version.mdx' The chart is highly customizable using [Helm configuration values](https://helm.sh/docs/intro/using\_helm/#customizing-the-chart-before-installing). Each value has a default tuned for an optimal getting started experience with Vault. Before going into production, please revie... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/helm/configuration.mdx | main | vault | [
0.11103099584579468,
0.03894063085317612,
0.04077175632119179,
-0.09607571363449097,
0.01633651927113533,
0.007019129116088152,
-0.10293105989694595,
0.03196515887975693,
0.02132713608443737,
0.03379801660776138,
0.02954377979040146,
0.006234590895473957,
0.08474768698215485,
-0.0044196727... | -0.068268 |
Agent Injector. \*\*This should be pinned to a specific version when running in production.\*\* Otherwise, other changes to the chart may inadvertently upgrade your admission controller. - `pullPolicy` (`string: "IfNotPresent"`) - The pull policy for container images. The default pull policy is `IfNotPresent` which cau... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/helm/configuration.mdx | main | vault | [
0.07593174278736115,
0.04899631440639496,
0.009281801991164684,
-0.038452740758657455,
0.008323335088789463,
-0.010961168445646763,
-0.036398399621248245,
0.021812576800584793,
0.00047628110041841865,
-0.001392008038237691,
0.06029095873236656,
-0.08109765499830246,
0.0025016788858920336,
... | 0.00286 |
of compute resources. \*\*Setting this is highly recommended.\*\* ```yaml resources: requests: memory: '256Mi' cpu: '250m' limits: memory: '256Mi' cpu: '250m' ``` - `webhook` - Values that control the Mutating Webhook Configuration. - `failurePolicy` (`string: "Ignore"`) - Configures failurePolicy of the webhook. To bl... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/helm/configuration.mdx | main | vault | [
-0.007333618588745594,
0.10558903217315674,
-0.008693120442330837,
-0.0053655607625842094,
-0.012508525513112545,
-0.08058774471282959,
-0.014726446010172367,
-0.06673605740070343,
0.049302536994218826,
0.058322176337242126,
-0.01314467377960682,
-0.08787734806537628,
0.003907140344381332,
... | 0.114248 |
| podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app.kubernetes.io/name: {{ template "vault.name" . }}-agent-injector app.kubernetes.io/instance: "{{ .Release.Name }}" component: webhook topologyKey: kubernetes.io/hostname ``` - `topologySpreadConstraints` (`array: []`) -... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/helm/configuration.mdx | main | vault | [
0.02244369313120842,
0.03936908394098282,
0.010884406045079231,
-0.005435454659163952,
-0.021511206403374672,
0.005827633664011955,
-0.007963679730892181,
-0.004846637602895498,
-0.004203363787382841,
0.013447913341224194,
0.017521636560559273,
-0.07695452123880386,
0.014544647186994553,
-... | 0.151307 |
minimum consecutive successes for the probe to be considered successful after having failed. - `timeoutSeconds` (`int: 3`) - When set to a value, configures the number of seconds after which the probe times out. - `startupProbe` - Values that configure the startup probe for the injector. - `failureThreshold` (`int: 2`)... | https://github.com/hashicorp/web-unified-docs/blob/main//content/vault/v1.21.x/content/docs/deploy/kubernetes/helm/configuration.mdx | main | vault | [
-0.009936358779668808,
0.03264540061354637,
0.015005920082330704,
0.02859373949468136,
-0.025353332981467247,
-0.05104059353470802,
-0.0014395012985914946,
0.018645424395799637,
0.060921382158994675,
0.002575910883024335,
0.0077940672636032104,
-0.09222999960184097,
0.03303827345371246,
-0... | 0.151592 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.