Vault-CRD
  • Introduction
  • How does Vault-CRD work?
  • Supported Secret Types
    • Secret Type - KEYVALUE
    • Secret Type - KEYVALUEV2
    • Secret Type - PKI
    • Secret Type - PKIJKS
    • Secret Type - CERT
    • Secret Type - CERTJKS
    • Secret Type - DOCKERCFG
    • Secret Type - PROPERTIES
  • Change Detection
  • Install Vault-CRD
    • Self Signed Certificates
    • Enable Admission Webhook
Powered by GitBook
On this page
  • How To
  • Change Adjustment Callback
  1. Supported Secret Types

Secret Type - KEYVALUE

The KEYVALUE-Type is made for synchronising Secrets stored in a KV Secret Engine with Kubernetes Secrets.

It only supports simple Key-Value pairs and not nested Values.

How To

First write some secrets to HashiCorp Vault:

$ vault write secret/test-secret key=value key1=value1

After this create the following Vault-Resource and apply it to Kubernetes:

apiVersion: "koudingspawn.de/v1"
kind: Vault
metadata:
  name: test-secret
spec:
  type: "KEYVALUE"
  path: "secret/test-secret"

Now you should see, that new Secret and the Vault resource are available:

$ kubectl get vault test-secret
NAME             AGE
test-secret      7d
$ kubectl get secret test-secret
NAME                                   TYPE                                  DATA      AGE
test-secret                            Opaque                                2         7d

Change Adjustment Callback

PreviousSupported Secret TypesNextSecret Type - KEYVALUEV2

Last updated 4 years ago

For more details please see !

Change Detection