๐Ÿ“ฆ hashicorp / vault-k8s

First-class support for Vault and Kubernetes.

โ˜… 834 stars โ‘‚ 171 forks ๐Ÿ‘ 834 watching โš–๏ธ Mozilla Public License 2.0
๐Ÿ“ฅ Clone https://github.com/hashicorp/vault-k8s.git
HTTPS git clone https://github.com/hashicorp/vault-k8s.git
SSH git clone git@github.com:hashicorp/vault-k8s.git
CLI gh repo clone hashicorp/vault-k8s
Loading files...
๐Ÿ“„ README.md

Vault + Kubernetes (vault-k8s)

:warning: Please note: We take Vault's security and our users' trust very seriously. If
you believe you have found a security issue in Vault K8s, please responsibly disclose by contacting us at security@hashicorp.com.

The vault-k8s binary includes first-class integrations between Vault and Kubernetes. Currently the only integration in this repository is the Vault Agent Sidecar Injector (agent-inject). In the future more integrations will be found here.

The Kubernetes integrations with Vault are documented directly on the Vault website. This README will present a basic overview of each use case, but for full documentation please reference the Vault website.

This project is versioned separately from Vault. Supported Vault versions for each feature will be noted below. By versioning this project separately, we can iterate on Kubernetes integrations more quickly and release new versions without forcing Vault users to do a full Vault upgrade.

Features

Agent Inject is a mutation webhook controller that injects Vault Agent containers into pods meeting specific annotation criteria. (Requires Vault 1.3.1+)

Installation

vault-k8s is distributed in multiple forms:

  • The recommended installation method is the official
Vault Helm chart. This will automatically configure the Vault and Kubernetes integration to run within an existing Kubernetes cluster.

  • A Docker image hashicorp/vault-k8s is available. This can be used to manually run vault-k8s within a scheduled environment.