fix
This commit is contained in:
23
README.md
23
README.md
@@ -19,11 +19,24 @@
|
||||
|
||||
1. прописываем в переменных адрес vault-сервера
|
||||
2. запускаем чарт `helm upgrade --install --create-namespace -n vault vault helm/vault`
|
||||
3. если у вас версия куба 1.24 и выше, то создаем токен руками
|
||||
|
||||
```bash
|
||||
cat > vault-secret.yaml <<EOF
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: vault-token-g955r
|
||||
annotations:
|
||||
kubernetes.io/service-account.name: vault
|
||||
type: kubernetes.io/service-account-token
|
||||
EOF
|
||||
```
|
||||
|
||||
### 3. подключение из куба в vault
|
||||
|
||||
1. `vault auth enable kubernetes`
|
||||
2. подсмотреть имя у VAULT_HELM_SECRET_NAME=vault-token-xxxxx
|
||||
2. подсмотреть имя у VAULT_HELM_SECRET_NAME=vault-token-xxxxx в кубе
|
||||
3. `TOKEN_REVIEW_JWT=$(kubectl get secret $VAULT_HELM_SECRET_NAME -n vault --output='go-template={{ .data.token }}' | base64 --decode)`
|
||||
4. `KUBE_CA_CERT=$(kubectl config view --raw --minify --flatten --output='jsonpath={.clusters[].cluster.certificate-authority-data}' | base64 --decode)`
|
||||
5. `KUBE_HOST=$(kubectl config view --raw --minify --flatten --output='jsonpath={.clusters[].cluster.server}')`
|
||||
@@ -41,7 +54,7 @@ vault write auth/kubernetes/config \
|
||||
|
||||
```bash
|
||||
vault policy write vault-test - <<EOF
|
||||
path "kv/secret/data/vault-test/config" {
|
||||
path "kv/data/secret/vault-test" {
|
||||
capabilities = ["read"]
|
||||
}
|
||||
EOF
|
||||
@@ -59,6 +72,6 @@ vault write auth/kubernetes/role/vault-test \
|
||||
|
||||
### 4. Запуск тестового деплоя
|
||||
|
||||
1. `vault kv put kv/secret/data/vault-test/config username='vassiliy' password='password' database='testdb' psqlhost='psql-service'`
|
||||
2. `vault kv get -format=json kv/secret/data/vault-test/config | jq ".data.data"`
|
||||
3. `k apply -f vault-test.yaml`
|
||||
1. `vault kv put kv/secret/vault-test username='vassiliy' password='password' database='testdb' psqlhost='psql-service'`
|
||||
2. `vault kv get -format=json kv/secret/vault-test | jq ".data.data"`
|
||||
3. `k apply -f k8s/vault-test.yaml`
|
||||
|
@@ -30,9 +30,9 @@ spec:
|
||||
annotations:
|
||||
vault.hashicorp.com/agent-inject: 'true'
|
||||
vault.hashicorp.com/role: 'vault-test'
|
||||
vault.hashicorp.com/agent-inject-secret-credentials.txt: 'kv/secret/data/vault-test/config'
|
||||
vault.hashicorp.com/agent-inject-template-credentials.txt: |
|
||||
{{- with secret "kv/secret/data/vault-test/config" -}}
|
||||
vault.hashicorp.com/agent-inject-secret-credentials: 'kv/secret/vault-test'
|
||||
vault.hashicorp.com/agent-inject-template-credentials: |
|
||||
{{- with secret "kv/secret/vault-test" -}}
|
||||
postgresql://{{ .Data.data.username }}:{{ .Data.data.password }}@{{ .Data.data.psqlhost }}:5432/{{ .Data.data.database }}
|
||||
{{- end -}}
|
||||
spec:
|
||||
|
Reference in New Issue
Block a user