-
Notifications
You must be signed in to change notification settings - Fork 326
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
consul-helm: Support using Vault for all secrets #656
Comments
This would make upgrades/rebuilds immensely easier. If any code contribution is needed for this I will dedicate the time if so desired. |
@shellfu Could you give us more details on how that would upgrades/rebuilds easier? Do you currently also use Vault today? |
Yes, we currently use Vault to manage the majority of our secrets. Having Vault manage the certificates in the context of K8s would be ideal as rotations could be managed in Vault vs on Kube. |
Any updates on this feature? |
We're working on it right now. Stay tuned! |
Closing as this is mostly addressed by: #904. We'll work on addressing the multi-dc capabilities in a future release. |
Would be great to support be able to retrieve all secret material: ACL tokens, TLS certs, etc. from Vault.
The text was updated successfully, but these errors were encountered: