All Projects → OT-CONTAINER-KIT → k8s-vault-webhook

OT-CONTAINER-KIT / k8s-vault-webhook

Licence: Apache-2.0 License
A k8s vault webhook is a Kubernetes webhook that can inject secrets into Kubernetes resources by connecting to multiple secret managers

Programming Languages

go
31211 projects - #10 most used programming language
shell
77523 projects
Makefile
30231 projects
Dockerfile
14818 projects

Projects that are alternatives of or similar to k8s-vault-webhook

secrets cli
CLI for storing and reading your secrets via vault
Stars: ✭ 24 (-77.57%)
Mutual labels:  vault, secret-management, secrets, hashicorp-vault
Helm Secrets
Successor of zendesk/helm-secrets - A helm plugin that help manage secrets with Git workflow and store them anywhere
Stars: ✭ 165 (+54.21%)
Mutual labels:  vault, helm, secret-management, secrets
Helm Secrets
DEPRECATED A helm plugin that help manage secrets with Git workflow and store them anywhere
Stars: ✭ 1,129 (+955.14%)
Mutual labels:  helm, secret-management, secrets
thycotic.secretserver
PowerShell module for automating with Thycotic Secret Server REST API
Stars: ✭ 41 (-61.68%)
Mutual labels:  vault, secret-management, secrets
secrets-proxy
🔑 A secure proxy service for managing OneOps secrets.
Stars: ✭ 12 (-88.79%)
Mutual labels:  vault, secret-management, secrets
Cryptr
Cryptr: a GUI for Hashicorp's Vault
Stars: ✭ 324 (+202.8%)
Mutual labels:  vault, secret-management, secrets
Hashicorp Vault Plugin
Jenkins plugin to populate environment variables from secrets stored in HashiCorp's Vault.
Stars: ✭ 191 (+78.5%)
Mutual labels:  vault, secret-management, secrets
teller
Cloud native secrets management for developers - never leave your command line for secrets.
Stars: ✭ 998 (+832.71%)
Mutual labels:  vault, secret-management, secrets
envkey-python
EnvKey's python library. Protect API keys and credentials. Keep configuration in sync.
Stars: ✭ 24 (-77.57%)
Mutual labels:  secret-management, secrets
envkey-node
EnvKey's official Node.js client library
Stars: ✭ 46 (-57.01%)
Mutual labels:  secret-management, secrets
vault-demo
Walkthroughs and scripts for my @hashicorp Vault talks
Stars: ✭ 67 (-37.38%)
Mutual labels:  vault, hashicorp-vault
breakglass
A command line tool to provide login credentials from Hashicorp Vault
Stars: ✭ 33 (-69.16%)
Mutual labels:  vault, hashicorp-vault
hips
Manage secrets alongside your code
Stars: ✭ 17 (-84.11%)
Mutual labels:  secrets, secret-managers
configurator
Synchronize and Version Control ConfigMaps & Secrets across Deployment Rollouts.
Stars: ✭ 68 (-36.45%)
Mutual labels:  helm, secrets
terraform-aws-secrets-manager
Terraform module to create Amazon Secrets Manager resources.
Stars: ✭ 37 (-65.42%)
Mutual labels:  secret-management, secrets
emacs-run-command
Efficient and ergonomic external command invocation for Emacs
Stars: ✭ 64 (-40.19%)
Mutual labels:  integration, helm
inspr
Inspr is an agnostic application mesh for simpler, faster, and securer development of distributed applications (dApps).
Stars: ✭ 49 (-54.21%)
Mutual labels:  integration, helm
vault-puppet
Using @hashicorp Vault with Puppet
Stars: ✭ 36 (-66.36%)
Mutual labels:  vault, hashicorp-vault
argocd-vault-plugin
An Argo CD plugin to retrieve secrets from Secret Management tools and inject them into Kubernetes secrets
Stars: ✭ 404 (+277.57%)
Mutual labels:  vault, secret-management
lockgit
A CLI tool for storing encrypted data in a git repo
Stars: ✭ 121 (+13.08%)
Mutual labels:  vault, secret-management

Azure Pipelines GoReportCard GitHub go.mod Go version (subdirectory of monorepo) made-with-Go Docker License

k8s-vault-webhook is a Kubernetes admission webhook which listen for the events related to Kubernetes resources for injecting secret directly from secret manager to pod, secret, and configmap. The motive of creating this project is to provide a dynamic secret injection to containers/pods running inside Kubernetes from different secret managers for enhanced security.

Documentation is available here:- https://ot-container-kit.github.io/k8s-vault-webhook/

Blog Link:- https://blog.opstree.com/2021/09/14/introducing-kubernetes-vault-web-hook/

The secret managers which are currently supported:-

This project is based on secret-consumer-webhook. Please check out the source code at https://github.com/innovia/secrets-consumer-webhook.

Supported Features

  • Authentication to Hashicorp vault using Kubernetes service-account
  • RBAC implementation of vault using different policies of vault and association of policy with service-account
  • Inject secret directly to pods/containers running inside Kubernetes
  • Inject secret directly to pods/containers from AWS Secret Manager
  • Authentication with AWS Secret Manager with access key and iam role
  • Fetch secrets from Azure Key Vault and inject them in pods/containers
  • Pod AD identity and Service principal based authentication in Azure
  • Authentication with AWS Secret Manager with access key and iam role
  • Authenticate and authorize using GCP service-account and annotations
  • Secret injection in pods/containers from GCP Secret Manager
  • Support regex to inject all secrets from a certain path of Vault
  • Inject secrets directly to the process of container, i.e. after the injection you cannot read secrets from the environment variable

Architecture

Installation

k8s-vault-webhook can easily get installed by using Helm. We just simple need to add the repository of our helm charts.

$ helm repo add ot-helm https://github.com/OT-CONTAINER-KIT/helm-charts

$ helm upgrade k8s-vault-webhook ot-helm/k8s-vault-webhook --namespace <namespace> --install

If you want to pass your custom values file while installing the chart, you can find the values file here

Quickstart

For setting up a quickstart environment for demo, you can start quickstart from here

Development

If you like to contribute to this project, you are more than welcome. Please see our DEVELOPMENT.md for details.

Release History

Please see our CHANGELOG.md for details.

Contact

If you have any suggestion or query. Contact us at

[email protected]

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].