try vault postgres secret engine
This commit is contained in:
@@ -5,6 +5,7 @@ metadata:
|
||||
labels:
|
||||
{{- include "webapp.labels" . | nindent 4 }}
|
||||
spec:
|
||||
revisionHistoryLimit: 3
|
||||
{{- if not .Values.autoscaling.enabled }}
|
||||
replicas: {{ .Values.replicaCount }}
|
||||
{{- end }}
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
apiVersion: secrets.hashicorp.com/v1beta1
|
||||
kind: VaultAuth
|
||||
metadata:
|
||||
name: static-auth
|
||||
name: auth
|
||||
namespace: {{ .Release.Namespace }}
|
||||
spec:
|
||||
method: kubernetes
|
||||
|
||||
25
chart/templates/vaultdynamicsecret.yaml
Normal file
25
chart/templates/vaultdynamicsecret.yaml
Normal file
@@ -0,0 +1,25 @@
|
||||
apiVersion: secrets.hashicorp.com/v1beta1
|
||||
kind: VaultDynamicSecret
|
||||
metadata:
|
||||
name: vso-db
|
||||
namespace: {{ .Release.Namespace }}
|
||||
spec:
|
||||
|
||||
# Mount path of the secrets backend
|
||||
mount: postgres
|
||||
|
||||
# Path to the secret
|
||||
path: creds/webapp
|
||||
|
||||
# Where to store the secrets, VSO will create the secret
|
||||
destination:
|
||||
create: true
|
||||
name: vso-db-credentials
|
||||
|
||||
# Restart these pods when secrets rotated
|
||||
rolloutRestartTargets:
|
||||
- kind: Deployment
|
||||
name: {{ include "webapp.fullname" . }}
|
||||
|
||||
# Name of the CRD to authenticate to Vault
|
||||
vaultAuthRef: auth
|
||||
@@ -21,4 +21,4 @@ spec:
|
||||
refreshAfter: 30s
|
||||
|
||||
# Name of the CRD to authenticate to Vault
|
||||
vaultAuthRef: static-auth
|
||||
vaultAuthRef: auth
|
||||
Reference in New Issue
Block a user