ricoberger/vault-secrets-operator
Create Kubernetes secrets from Vault for a secure GitOps based workflow.
GoMIT
Issues
- 4
TLS failed to verify certificate
#260 opened by jascsch - 1
Add multi-cluster k8s support?
#172 opened by a-dragos - 9
Exclude given VaultSecrets
#234 opened by ejsuncy - 4
error: leader election lost
#244 opened by jascsch - 1
Metrics not cleaned up after secret removal
#243 opened by zeeZ - 2
- 1
- 1
Add support for RabbitMQ secret engine
#200 opened by ThiagoFelippi - 1
Throw the error that could not update status when delete VaultSecret via foreground cascading deletion
#197 opened by EricSyu - 4
no azure identity found for request clientID
#196 opened by HDchamp - 1
- 2
Image/Release version mismatch
#194 opened by swarren83 - 2
Future of the project
#193 opened by Pluggi - 3
Recovering from an invalid key in Vault by vault-secrets-operator in VaultSecret object
#192 opened by michalgoldys - 8
kubernetes auth not working
#184 opened by kyuwoo-choi - 1
- 3
Way to monitor failed VaultSecrets sync
#154 opened by fbueno - 2
Install via GitOps way (FluxCD)?
#176 opened by danielkimuipath - 1
Adding support for more `SecretEngine`s?
#170 opened by sakiib - 1
[Feature] Creating multiple Kubernetes Secrets by list secrets from Vault.
#168 opened by nightguide - 3
Use custom email for GCP IAM auth
#165 opened by nicoche - 2
Vulnerabilities in images and libraries.
#158 opened by linuxbsdfreak - 1
Allow Chart to Accept Image Digest
#161 opened by Zarmbinski - 2
- 2
Error with vault-secrets-operator
#150 opened by jvaitla - 27
Error with K8s Auth Method
#124 opened by linuxbsdfreak - 5
invalid secret name
#156 opened by artarik - 2
Adding Support of Additional Engines
#153 opened by Pluggi - 1
load secrets via data volumes
#146 opened by swarren83 - 1
Update documentation for reconciliationTime
#147 opened by darrencola-dev - 0
Consider merging efforts with ESO
#144 opened by gusfcarvalho - 2
Feature #126 breaks renewal of tokens
#140 opened by Chumper - 4
Allow labels to be added to the resulting secret
#138 opened by Chumper - 0
Issues applying the helm chart Role in namespace
#136 opened by ecojan - 16
imagePullSecrets for GCR - gcp secrets engine
#123 opened by TJM - 3
Applications error
#133 opened by f0rcas - 1
Not pull image 1.16.1
#135 opened by ymrsmns - 2
truststore","error":"invalid secret data",
#120 opened by Ankitcapco - 3
Helm upgrade from 1.14.5 to 1.15.0 deleted the CRD
#115 opened by ChipWolf - 10
cannot renew token with k8s auth
#131 opened by tuananh - 0
promote api to v1beta1 and v1
#129 opened by swarren83 - 12
Claim iss is invalid
#104 opened by rgruyters - 1
- 5
- 1
- 2
Access based on vault policies
#103 opened by anuragpulla - 3
- 2
- 3
Not able to start with not renewable token
#96 opened by d3m0n1c - 7
Support ARM
#92 opened by ChipWolf