You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Jul 26, 2022. It is now read-only.
Copy file name to clipboardExpand all lines: README.md
+22-13
Original file line number
Diff line number
Diff line change
@@ -227,11 +227,11 @@ by default an `ExternalSecret` may access arbitrary keys from the backend e.g.
227
227
name: password
228
228
```
229
229
230
-
An enforced naming convention helps to keep the structure tidy and limits the access according
231
-
to your naming schema.
230
+
An enforced naming convention helps to keep the structure tidy and limits the access according
231
+
to your naming schema.
232
232
233
-
Configure the schema as regular expression in the namespace using an annotation.
234
-
This allows `ExternalSecrets` in `core-namespace` just to access secrets that start with
233
+
Configure the schema as regular expression in the namespace using an annotation.
234
+
This allows `ExternalSecrets` in `core-namespace` just to access secrets that start with
235
235
`/dev/cluster1/core-namespace/`:
236
236
237
237
```yaml
@@ -342,6 +342,13 @@ spec:
342
342
343
343
kubernetes-external-secrets supports fetching secrets from [Hashicorp Vault](https://www.vaultproject.io/), using the [Kubernetes authentication method](https://www.vaultproject.io/docs/auth/kubernetes).
344
344
345
+
```yml
346
+
env:
347
+
VAULT_ADDR: https://vault.domain.tld
348
+
DEFAULT_VAULT_MOUNT_POINT: "k8s-auth" # optional, default value to be used if not specified in the ExternalSecret
349
+
DEFAULT_VAULT_ROLE: "k8s-auth-role" # optional, default value to be used if not specified in the ExternalSecret
350
+
```
351
+
345
352
You will need to set the `VAULT_ADDR` environment variables so that kubernetes-external-secrets knows which endpoint to connect to, then create `ExternalSecret` definitions as follows:
346
353
347
354
```yml
@@ -352,10 +359,12 @@ metadata:
352
359
spec:
353
360
backendType: vault
354
361
# Your authentication mount point, e.g. "kubernetes"
362
+
# Overrides cluster DEFAULT_VAULT_MOUNT_POINT
355
363
vaultMountPoint: my-kubernetes-vault-mount-point
356
364
# The vault role that will be used to fetch the secrets
357
365
# This role will need to be bound to kubernetes-external-secret's ServiceAccount; see Vault's documentation:
The external secret will poll for changes to the secret according to the value set for POLLER_INTERVAL_MILLISECONDS in env. Depending on the time interval this is set to you may incur additional charges as Google Secret Manager [charges](https://cloud.google.com/secret-manager/pricing) per a set number of API calls.
476
485
477
-
A service account is required to grant the controller access to pull secrets.
486
+
A service account is required to grant the controller access to pull secrets.
Instructions are here: [Enable Workload Identity](https://cloud.google.com/kubernetes-engine/docs/how-to/workload-identity#enable_workload_identity_on_a_new_cluster). To enable workload identity on an existing cluster (which is not covered in that document), first enable it on the cluster like so:
0 commit comments