36 lines
1.1 KiB
Markdown
36 lines
1.1 KiB
Markdown
### 1) HashiCorp Vault
|
|
Not currently in use (using bitnami sealed-secrets instead); left for reference
|
|
|
|
##### 1.1) Create `persistentVolume` and `ingressRoute`
|
|
*Requires specifying a `uid` & `gid` in the flexvolSMB-`persistentVolume`*
|
|
```shell
|
|
kubectl create namespace vault
|
|
kubectl apply -f services/Vault/persistentVolume-Vault.yml
|
|
kubectl apply -f services/Vault/ingressRoute-Vault.yml
|
|
```
|
|
##### 1.2) Install Helm Chart
|
|
*REMOVED; left for reference*
|
|
See [HashiCorp Vault](https://www.vaultproject.io/docs/platform/k8s/helm/run):
|
|
```shell
|
|
helm repo add hashicorp https://helm.releases.hashicorp.com
|
|
helm repo update
|
|
helm install vault hashicorp/vault --namespace vault --values=services/Vault/chart-values.yml
|
|
```
|
|
Configure Vault for use;
|
|
- ~~Enable Kubernetes authentication (see https://www.vaultproject.io/api-docs/auth/kubernetes)~~- Store basic access policy template
|
|
- Enable `kv`-engine
|
|
```
|
|
# kubectl exec -n vault -it vault-0 -- sh
|
|
|
|
# It might be necessary to first login with an existing token:
|
|
# vault login
|
|
|
|
cat <<EOF > /home/vault/app-policy.hcl
|
|
path "secret*" {
|
|
capabilities = ["read"]
|
|
}
|
|
EOF
|
|
|
|
vault secrets enable -path=secret -version=2 kv
|
|
```
|