The Vault Secrets Operator (VSO) allows Pods to consume Vault secrets natively from Kubernetes Secrets.
The Vault Secrets Operator operates by watching for changes to its supported set of Custom Resource Definitions (CRD). Each CRD provides the specification required to allow the Operator to synchronize a Vault Secrets to a Kubernetes Secret. The Operator writes the source Vault secret data directly to the destination Kubernetes Secret, ensuring that any changes made to the source are replicated to the destination over its lifetime. In this way, an application only needs to have access to the destination secret in order to make use of the secret data contained within.
See the developer docs for more info here
Please note that The Vault Secrets Operator is in public beta. Please provide your feedback by opening a GitHub issue
here. We will be reviewing PR contributions after the beta period has elapsed.
Thanks!
The following features are supported by the Vault Secrets Operator:
- All Vault secret engines supported.
- TLS/mTLS communications with Vault.
- Authentication using the requesting
Pod
'sServiceAccount
via the Kubernetes Auth Method - Syncing Vault Secrets to Kubernetes Secrets.
- Secret rotation for
Deployment
,ReplicaSet
,StatefulSet
Kubernetes resource types. - Prometheus' instrumentation for monitoring the Operator
- Supported installation methods:
Helm
,Kustomize
Setup kubernetes and deploy the samples:
# Start a KinD cluster
make setup-kind
# Deploy Vault
make setup-integration-test
# Configure Vault
./config/samples/setup.sh
# Build and deploy the operator
make build docker-build deploy-kind
# Deploy the sample K8s resources
kubectl apply -k config/samples
Inspect the resulting secrets:
kubectl get secrets -n tenant-1 secret1 -o yaml
kubectl get secrets -n tenant-1 pki1 -o yaml
kubectl get secrets -n tenant-2 secret1 -o yaml
Delete the samples:
kubectl delete -k config/samples
The file config/samples/secrets_v1alpha1_vaultpkisecret_tls.yaml
contains an
example of using VaultPKISecret to populate a TLS secret for use with an
Ingress. This sample takes a little more setup to test it out (derived from the
kind docs).
The TLS example is part of the samples, so setup kind, configure Vault, and deploy the operator as described above.
Then deploy the nginx ingress controller:
kubectl apply -f https://raw.githubusercontent.com/kubernetes/ingress-nginx/main/deploy/static/provider/kind/deploy.yaml
kubectl wait --namespace ingress-nginx \
--for=condition=ready pod \
--selector=app.kubernetes.io/component=controller \
--timeout=90s
Check the deployed app with something like curl, it should return the tls-app
hostname, and the certificate should have a ~1.5m TTL:
$ curl -k https://localhost:38443/tls-app/hostname
tls-app
$ curl -kvI https://localhost:38443/tls-app/hostname
...
* Server certificate:
* subject: CN=localhost
* start date: Mar 17 05:53:28 2023 GMT
* expire date: Mar 17 05:54:58 2023 GMT
* issuer: CN=example.com
...
Watch the nginx controller logs to see the TLS secret being rotated:
kubectl logs -f -n ingress-nginx -l app.kubernetes.io/instance=ingress-nginx
make test
# Start a KinD cluster
make setup-kind
# Build the operator binary, image, and deploy to the KinD cluster
make ci-build ci-docker-build ci-deploy-kind ci-deploy
# Run the integration tests (includes Vault deployment)
make integration-test
# Create an EKS cluster and a ECR repository
make create-eks
# Build the operator binary, image, and deploy to the ECR repository
make ci-ecr-build-push
# Run the integration tests (includes Vault OSS deployment)
make integration-test-eks
# Run the integration tests (includes Vault ent deployment, have the Vault license as environment variable)
make integration-test-eks VAULT_ENTERPRISE=true ENT_TESTS=true