-
Notifications
You must be signed in to change notification settings - Fork 189
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for vault kubernetes authentication #274
Comments
In some sort, related to #252 |
Having this implemented will enable really great level of security.
So if I understood correctly, it's a killer feature, much better than vault injector or Vault CSI in current state. |
@eikenb Hi. I am going to implement this, and as I see, I will need to:
Am I right about the idea of implementation? I found only one mention about implementing other auth methods in the comment of |
Would it make sense to include vault namespace also? |
Correct me if I'm wrong, it's already supported. |
Hey @Kryvchun, @yellowmegaman, @justinas-b... Sorry for the silence. I've been busy trying to get up to speed on consul-esm to fix an important bug there and have been ignoring my inbox. I haven't worked on the Auth portions of consul-template yet but will happily work through the PRs there. With a quick skim it seems like you're on the right path. The hardest part will probably be figuring out how to test it as consul-template relies heavily on integration tests which won't work here. But that would be part of the consul-template PR and we can figure that out there. I'm not actively working on consul-template right now but try to spend time every Monday on community feedback for all the projects. I am planning on working on Envconsul soon-ish (next after the consul-esm 0.6.1 bugfix release I'm working on now) and we might be able to squeeze all this in at that point. |
Can anyone please share the documentation on using envconsul with Kubernetes workload. |
Are you about this https://github.com/hashicorp/envconsul/blob/main/README.md?plain=1#L460 ? |
Thanks @Kryvchun for the quick response. Is this part of the latest release ? |
If anyone would like to write up a quick example to include in the README or, if better, another file I'd be happy to include it. Thanks. |
Hi John & Maksym, Can envconsul solve this. Can it export the variable with dot into container's shell. |
That should work with envconsul. $ consul kv put foo/bar.zed.wha 1234 I used consul as it was handy (testing stuff like this right now) but should work the same either way. |
thanks John for confirming this, I tested this with Vault and can use non-standard identifiars as secret keys. |
Sorry @gauravkr19, my k8s knowledge is very limited. You might want to try asking in hashicorp's discuss forums, maybe the vault-k8s one will be able to help. |
Just realized this ticket is still open and I've merged this already. IE. it didn't auto-close. This support was merged in with #281 |
@eikenb Great! Thank you. Can we have new release with it? |
@yellowmegaman.. I have 1 last bug to finish fixing then will be putting out a new release. Should be this week as I have a PR already up to fix the bug (upstream in consul-template) and am just waiting on a review. |
Hey! For the workloads running in kubernetes, usually kubernetes authentication method is used on a Vault, through it would be awesome to have this supported on
envconsul
also.This would eliminate need of managing all the tokens for authentication with vault.
More about authentication method here: https://www.vaultproject.io/docs/auth/kubernetes
The text was updated successfully, but these errors were encountered: