Last active
December 17, 2022 12:09
-
-
Save soeirosantos/11b69355f044ebd73e9dc04ab9014e24 to your computer and use it in GitHub Desktop.
Vault CSI configuration generated from helm.sh/chart: vault-0.23.0
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | |
apiVersion: v1 | |
kind: ServiceAccount | |
metadata: | |
name: vault-secrets-store-csi-driver-upgrade-crds | |
namespace: default | |
labels: | |
app.kubernetes.io/instance: "csi" | |
app.kubernetes.io/name: "secrets-store-csi-driver" | |
app.kubernetes.io/version: "1.2.4" | |
app: secrets-store-csi-driver | |
--- | |
apiVersion: v1 | |
kind: ServiceAccount | |
metadata: | |
name: vault-secrets-store-csi-driver-keep-crds | |
namespace: default | |
labels: | |
app.kubernetes.io/instance: "csi" | |
app.kubernetes.io/name: "secrets-store-csi-driver" | |
app.kubernetes.io/version: "1.2.4" | |
app: secrets-store-csi-driver | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
name: vault-secrets-store-csi-driver-upgrade-crds | |
labels: | |
app.kubernetes.io/instance: "csi" | |
app.kubernetes.io/name: "secrets-store-csi-driver" | |
app.kubernetes.io/version: "1.2.4" | |
app: secrets-store-csi-driver | |
rules: | |
- apiGroups: ["apiextensions.k8s.io"] | |
resources: ["customresourcedefinitions"] | |
verbs: ["get", "create", "update", "patch"] | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
name: vault-secrets-store-csi-driver-keep-crds | |
labels: | |
app.kubernetes.io/instance: "csi" | |
app.kubernetes.io/name: "secrets-store-csi-driver" | |
app.kubernetes.io/version: "1.2.4" | |
app: secrets-store-csi-driver | |
rules: | |
- apiGroups: ["apiextensions.k8s.io"] | |
resources: ["customresourcedefinitions"] | |
verbs: ["get", "patch"] | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
name: vault-secrets-store-csi-driver-upgrade-crds | |
labels: | |
app.kubernetes.io/instance: "csi" | |
app.kubernetes.io/name: "secrets-store-csi-driver" | |
app.kubernetes.io/version: "1.2.4" | |
app: secrets-store-csi-driver | |
subjects: | |
- kind: ServiceAccount | |
name: vault-secrets-store-csi-driver-upgrade-crds | |
namespace: default | |
roleRef: | |
kind: ClusterRole | |
name: vault-secrets-store-csi-driver-upgrade-crds | |
apiGroup: rbac.authorization.k8s.io | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
name: vault-secrets-store-csi-driver-keep-crds | |
labels: | |
app.kubernetes.io/instance: "csi" | |
app.kubernetes.io/name: "secrets-store-csi-driver" | |
app.kubernetes.io/version: "1.2.4" | |
app: secrets-store-csi-driver | |
subjects: | |
- kind: ServiceAccount | |
name: vault-secrets-store-csi-driver-keep-crds | |
namespace: default | |
roleRef: | |
kind: ClusterRole | |
name: vault-secrets-store-csi-driver-keep-crds | |
apiGroup: rbac.authorization.k8s.io | |
--- | |
apiVersion: batch/v1 | |
kind: Job | |
metadata: | |
name: secrets-store-csi-driver-upgrade-crds | |
namespace: default | |
labels: | |
app.kubernetes.io/instance: "csi" | |
app.kubernetes.io/name: "secrets-store-csi-driver" | |
app.kubernetes.io/version: "1.2.4" | |
app: secrets-store-csi-driver | |
spec: | |
backoffLimit: 0 | |
template: | |
metadata: | |
name: vault-secrets-store-csi-driver-upgrade-crds | |
spec: | |
serviceAccountName: vault-secrets-store-csi-driver-upgrade-crds | |
restartPolicy: Never | |
containers: | |
- name: crds-upgrade | |
image: "k8s.gcr.io/csi-secrets-store/driver-crds:v1.2.4" | |
args: | |
- apply | |
- -f | |
- crds/ | |
imagePullPolicy: IfNotPresent | |
nodeSelector: | |
kubernetes.io/os: linux | |
--- | |
apiVersion: batch/v1 | |
kind: Job | |
metadata: | |
name: secrets-store-csi-driver-keep-crds | |
namespace: default | |
labels: | |
app.kubernetes.io/instance: "csi" | |
app.kubernetes.io/name: "secrets-store-csi-driver" | |
app.kubernetes.io/version: "1.2.4" | |
app: secrets-store-csi-driver | |
spec: | |
backoffLimit: 0 | |
template: | |
metadata: | |
name: vault-secrets-store-csi-driver-keep-crds | |
spec: | |
serviceAccountName: vault-secrets-store-csi-driver-keep-crds | |
restartPolicy: Never | |
containers: | |
- name: crds-keep | |
image: "k8s.gcr.io/csi-secrets-store/driver-crds:v1.2.4" | |
args: | |
- patch | |
- crd | |
- secretproviderclasses.secrets-store.csi.x-k8s.io | |
- secretproviderclasspodstatuses.secrets-store.csi.x-k8s.io | |
- -p | |
- '{"metadata":{"annotations": {"helm.sh/resource-policy": "keep"}}}' | |
imagePullPolicy: IfNotPresent | |
nodeSelector: | |
kubernetes.io/os: linux | |
--- | |
apiVersion: v1 | |
kind: ServiceAccount | |
metadata: | |
name: secrets-store-csi-driver | |
namespace: default | |
labels: | |
app.kubernetes.io/instance: "csi" | |
app.kubernetes.io/name: "secrets-store-csi-driver" | |
app.kubernetes.io/version: "1.2.4" | |
app: secrets-store-csi-driver | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
creationTimestamp: null | |
name: secretproviderrotation-role | |
labels: | |
app.kubernetes.io/instance: "csi" | |
app.kubernetes.io/name: "secrets-store-csi-driver" | |
app.kubernetes.io/version: "1.2.4" | |
app: secrets-store-csi-driver | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- secrets | |
verbs: | |
- get | |
- list | |
- watch | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
creationTimestamp: null | |
labels: | |
app.kubernetes.io/instance: "csi" | |
app.kubernetes.io/name: "secrets-store-csi-driver" | |
app.kubernetes.io/version: "1.2.4" | |
app: secrets-store-csi-driver | |
rbac.authorization.k8s.io/aggregate-to-admin: "true" | |
rbac.authorization.k8s.io/aggregate-to-edit: "true" | |
name: secretproviderclasses-admin-role | |
rules: | |
- apiGroups: | |
- secrets-store.csi.x-k8s.io | |
resources: | |
- secretproviderclasses | |
verbs: | |
- get | |
- list | |
- watch | |
- create | |
- update | |
- patch | |
- delete | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
creationTimestamp: null | |
labels: | |
app.kubernetes.io/instance: "csi" | |
app.kubernetes.io/name: "secrets-store-csi-driver" | |
app.kubernetes.io/version: "1.2.4" | |
app: secrets-store-csi-driver | |
rbac.authorization.k8s.io/aggregate-to-view: "true" | |
name: secretproviderclasses-viewer-role | |
rules: | |
- apiGroups: | |
- secrets-store.csi.x-k8s.io | |
resources: | |
- secretproviderclasses | |
verbs: | |
- get | |
- list | |
- watch | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
creationTimestamp: null | |
name: secretprovidersyncing-role | |
labels: | |
app.kubernetes.io/instance: "csi" | |
app.kubernetes.io/name: "secrets-store-csi-driver" | |
app.kubernetes.io/version: "1.2.4" | |
app: secrets-store-csi-driver | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- secrets | |
verbs: | |
- create | |
- delete | |
- get | |
- list | |
- patch | |
- update | |
- watch | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
creationTimestamp: null | |
name: secretproviderclasses-role | |
labels: | |
app.kubernetes.io/instance: "csi" | |
app.kubernetes.io/name: "secrets-store-csi-driver" | |
app.kubernetes.io/version: "1.2.4" | |
app: secrets-store-csi-driver | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- events | |
verbs: | |
- create | |
- patch | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- secrets-store.csi.x-k8s.io | |
resources: | |
- secretproviderclasses | |
verbs: | |
- get | |
- list | |
- watch | |
- apiGroups: | |
- secrets-store.csi.x-k8s.io | |
resources: | |
- secretproviderclasspodstatuses | |
verbs: | |
- create | |
- delete | |
- get | |
- list | |
- patch | |
- update | |
- watch | |
- apiGroups: | |
- secrets-store.csi.x-k8s.io | |
resources: | |
- secretproviderclasspodstatuses/status | |
verbs: | |
- get | |
- patch | |
- update | |
- apiGroups: | |
- storage.k8s.io | |
resourceNames: | |
- secrets-store.csi.k8s.io | |
resources: | |
- csidrivers | |
verbs: | |
- get | |
- list | |
- watch | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
name: secretproviderrotation-rolebinding | |
labels: | |
app.kubernetes.io/instance: "csi" | |
app.kubernetes.io/name: "secrets-store-csi-driver" | |
app.kubernetes.io/version: "1.2.4" | |
app: secrets-store-csi-driver | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: secretproviderrotation-role | |
subjects: | |
- kind: ServiceAccount | |
name: secrets-store-csi-driver | |
namespace: default | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
name: secretprovidersyncing-rolebinding | |
labels: | |
app.kubernetes.io/instance: "csi" | |
app.kubernetes.io/name: "secrets-store-csi-driver" | |
app.kubernetes.io/version: "1.2.4" | |
app: secrets-store-csi-driver | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: secretprovidersyncing-role | |
subjects: | |
- kind: ServiceAccount | |
name: secrets-store-csi-driver | |
namespace: default | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
name: secretproviderclasses-rolebinding | |
labels: | |
app.kubernetes.io/instance: "csi" | |
app.kubernetes.io/name: "secrets-store-csi-driver" | |
app.kubernetes.io/version: "1.2.4" | |
app: secrets-store-csi-driver | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: secretproviderclasses-role | |
subjects: | |
- kind: ServiceAccount | |
name: secrets-store-csi-driver | |
namespace: default | |
--- | |
kind: DaemonSet | |
apiVersion: apps/v1 | |
metadata: | |
name: vault-secrets-store-csi-driver | |
namespace: default | |
labels: | |
app.kubernetes.io/instance: "csi" | |
app.kubernetes.io/name: "secrets-store-csi-driver" | |
app.kubernetes.io/version: "1.2.4" | |
app: secrets-store-csi-driver | |
spec: | |
selector: | |
matchLabels: | |
app: secrets-store-csi-driver | |
updateStrategy: | |
rollingUpdate: | |
maxUnavailable: 1 | |
type: RollingUpdate | |
template: | |
metadata: | |
annotations: | |
labels: | |
app.kubernetes.io/instance: "csi" | |
app.kubernetes.io/name: "secrets-store-csi-driver" | |
app.kubernetes.io/version: "1.2.4" | |
app: secrets-store-csi-driver | |
kubectl.kubernetes.io/default-container: secrets-store | |
spec: | |
serviceAccountName: secrets-store-csi-driver | |
affinity: | |
nodeAffinity: | |
requiredDuringSchedulingIgnoredDuringExecution: | |
nodeSelectorTerms: | |
- matchExpressions: | |
- key: type | |
operator: NotIn | |
values: | |
- virtual-kubelet | |
containers: | |
- name: node-driver-registrar | |
image: "k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.5.1" | |
args: | |
- --v=5 | |
- --csi-address=/csi/csi.sock | |
- --kubelet-registration-path=/var/lib/kubelet/plugins/csi-secrets-store/csi.sock | |
livenessProbe: | |
exec: | |
command: | |
- /csi-node-driver-registrar | |
- --kubelet-registration-path=/var/lib/kubelet/plugins/csi-secrets-store/csi.sock | |
- --mode=kubelet-registration-probe | |
initialDelaySeconds: 30 | |
timeoutSeconds: 15 | |
imagePullPolicy: IfNotPresent | |
volumeMounts: | |
- name: plugin-dir | |
mountPath: /csi | |
- name: registration-dir | |
mountPath: /registration | |
resources: | |
limits: | |
cpu: 100m | |
memory: 100Mi | |
requests: | |
cpu: 10m | |
memory: 20Mi | |
- name: secrets-store | |
image: "k8s.gcr.io/csi-secrets-store/driver:v1.2.4" | |
args: | |
- "--endpoint=$(CSI_ENDPOINT)" | |
- "--nodeid=$(KUBE_NODE_NAME)" | |
- "--provider-volume=/var/run/secrets-store-csi-providers" | |
- "--additional-provider-volume-paths=/etc/kubernetes/secrets-store-csi-providers" | |
- "--enable-secret-rotation=true" | |
- "--metrics-addr=:8095" | |
- "--provider-health-check-interval=2m" | |
- "--max-call-recv-msg-size=4194304" | |
env: | |
- name: CSI_ENDPOINT | |
value: unix:///csi/csi.sock | |
- name: KUBE_NODE_NAME | |
valueFrom: | |
fieldRef: | |
apiVersion: v1 | |
fieldPath: spec.nodeName | |
imagePullPolicy: IfNotPresent | |
securityContext: | |
privileged: true | |
ports: | |
- containerPort: 9808 | |
name: healthz | |
protocol: TCP | |
- containerPort: 8095 | |
name: metrics | |
protocol: TCP | |
livenessProbe: | |
failureThreshold: 5 | |
httpGet: | |
path: /healthz | |
port: healthz | |
initialDelaySeconds: 30 | |
timeoutSeconds: 10 | |
periodSeconds: 15 | |
volumeMounts: | |
- name: plugin-dir | |
mountPath: /csi | |
- name: mountpoint-dir | |
mountPath: /var/lib/kubelet/pods | |
mountPropagation: Bidirectional | |
- name: providers-dir | |
mountPath: /var/run/secrets-store-csi-providers | |
- name: providers-dir-0 | |
mountPath: "/etc/kubernetes/secrets-store-csi-providers" | |
resources: | |
limits: | |
cpu: 200m | |
memory: 200Mi | |
requests: | |
cpu: 50m | |
memory: 100Mi | |
- name: liveness-probe | |
image: "k8s.gcr.io/sig-storage/livenessprobe:v2.7.0" | |
imagePullPolicy: IfNotPresent | |
args: | |
- --csi-address=/csi/csi.sock | |
- --probe-timeout=3s | |
- --http-endpoint=0.0.0.0:9808 | |
- -v=2 | |
volumeMounts: | |
- name: plugin-dir | |
mountPath: /csi | |
resources: | |
limits: | |
cpu: 100m | |
memory: 100Mi | |
requests: | |
cpu: 10m | |
memory: 20Mi | |
volumes: | |
- name: mountpoint-dir | |
hostPath: | |
path: /var/lib/kubelet/pods | |
type: DirectoryOrCreate | |
- name: registration-dir | |
hostPath: | |
path: /var/lib/kubelet/plugins_registry/ | |
type: Directory | |
- name: plugin-dir | |
hostPath: | |
path: /var/lib/kubelet/plugins/csi-secrets-store/ | |
type: DirectoryOrCreate | |
- name: providers-dir | |
hostPath: | |
path: /var/run/secrets-store-csi-providers | |
type: DirectoryOrCreate | |
- name: providers-dir-0 | |
hostPath: | |
path: "/etc/kubernetes/secrets-store-csi-providers" | |
type: DirectoryOrCreate | |
nodeSelector: | |
kubernetes.io/os: linux | |
--- | |
apiVersion: csi.storage.k8s.io/v1alpha1 | |
kind: CSIDriver | |
metadata: | |
name: secrets-store.csi.k8s.io | |
labels: | |
app.kubernetes.io/instance: "csi" | |
app.kubernetes.io/name: "secrets-store-csi-driver" | |
app.kubernetes.io/version: "1.2.4" | |
app: secrets-store-csi-driver | |
spec: | |
podInfoOnMount: true | |
attachRequired: false | |
# Added in Kubernetes 1.16 with default mode of Persistent. Secrets store csi driver needs Ephermeral to be set. | |
volumeLifecycleModes: | |
- Ephemeral |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | |
apiVersion: v1 | |
kind: ServiceAccount | |
metadata: | |
name: vault-csi-provider | |
namespace: default | |
labels: | |
app.kubernetes.io/name: vault-csi-provider | |
app.kubernetes.io/instance: vault | |
--- | |
apiVersion: v1 | |
kind: ServiceAccount | |
metadata: | |
name: vault | |
namespace: default | |
labels: | |
app.kubernetes.io/name: vault | |
app.kubernetes.io/instance: vault | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRole | |
metadata: | |
name: vault-csi-provider-clusterrole | |
labels: | |
app.kubernetes.io/name: vault-csi-provider | |
app.kubernetes.io/instance: vault | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- serviceaccounts/token | |
verbs: | |
- create | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
name: vault-csi-provider-clusterrolebinding | |
labels: | |
app.kubernetes.io/name: vault-csi-provider | |
app.kubernetes.io/instance: vault | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: vault-csi-provider-clusterrole | |
subjects: | |
- kind: ServiceAccount | |
name: vault-csi-provider | |
namespace: default | |
--- | |
apiVersion: rbac.authorization.k8s.io/v1 | |
kind: ClusterRoleBinding | |
metadata: | |
name: vault-server-binding | |
labels: | |
app.kubernetes.io/name: vault | |
app.kubernetes.io/instance: vault | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: system:auth-delegator | |
subjects: | |
- kind: ServiceAccount | |
name: vault | |
namespace: default | |
--- | |
apiVersion: apps/v1 | |
kind: DaemonSet | |
metadata: | |
name: vault-csi-provider | |
namespace: default | |
labels: | |
app.kubernetes.io/name: vault-csi-provider | |
app.kubernetes.io/instance: vault | |
spec: | |
updateStrategy: | |
type: RollingUpdate | |
selector: | |
matchLabels: | |
app.kubernetes.io/name: vault-csi-provider | |
app.kubernetes.io/instance: vault | |
template: | |
metadata: | |
labels: | |
app.kubernetes.io/name: vault-csi-provider | |
app.kubernetes.io/instance: vault | |
spec: | |
serviceAccountName: vault-csi-provider | |
containers: | |
- name: vault-csi-provider | |
image: "hashicorp/vault-csi-provider:1.2.1" | |
imagePullPolicy: IfNotPresent | |
args: | |
- --endpoint=/provider/vault.sock | |
- --debug=false | |
env: | |
- name: VAULT_ADDR | |
value: http://vault.default.svc:8200 | |
volumeMounts: | |
- name: providervol | |
mountPath: "/provider" | |
- name: mountpoint-dir | |
mountPath: /var/lib/kubelet/pods | |
mountPropagation: HostToContainer | |
livenessProbe: | |
httpGet: | |
path: /health/ready | |
port: 8080 | |
failureThreshold: 2 | |
initialDelaySeconds: 5 | |
periodSeconds: 5 | |
successThreshold: 1 | |
timeoutSeconds: 3 | |
readinessProbe: | |
httpGet: | |
path: /health/ready | |
port: 8080 | |
failureThreshold: 2 | |
initialDelaySeconds: 5 | |
periodSeconds: 5 | |
successThreshold: 1 | |
timeoutSeconds: 3 | |
volumes: | |
- name: providervol | |
hostPath: | |
path: /etc/kubernetes/secrets-store-csi-providers | |
- name: mountpoint-dir | |
hostPath: | |
path: /var/lib/kubelet/pods |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment