We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
https://www.vaultproject.io/docs/agent/caching/index.html
The text was updated successfully, but these errors were encountered:
It would be helpful to have an annotation that enables a listener {} and cache {} block in the sidecar agent.
listener {}
cache {}
Something like
vault.hashicorp.com/agent-listen: bool (default: false) vault.hashicorp.com/agent-listen-tls-disable: bool (default: true) vault.hashicorp.com/agent-listen-address: string (default: 127.0.01:8200) vault.hashicorp.com/agent-cache-auto-auth: bool (default: false)
I'm migrating a number of services onto k8s which previously were able to access Vault via an agent listening on plain HTTP bound to 127.0.0.1.
I can reproduce this in k8s but only by using the configmap method to add a listener, which is ok but very verbose and repetitive for many services
Sorry, something went wrong.
#132 implements this. But I have kept TLS always disabled for now because there is no way to mount arbitrary volumes right now.
Successfully merging a pull request may close this issue.
https://www.vaultproject.io/docs/agent/caching/index.html
The text was updated successfully, but these errors were encountered: