Kubers is a simple implementation of a SecOps pattern, where a sidecar or init container is responsible for retrieving secrets from services like Azure KeyVault and making them available to the user's application via shared memory volume.
- Azure (KeyVault)
- AWS (Secrets Manager)
kubectl apply -k [email protected]:jacops/kubers.git
Please go to ./chart
folder for instructions and available configuration.
-
Enable agent injection by adding the following annotation:
kubers.jacops.pl/agent-inject: "true"
-
Set agent provider by adding the following annotation (for example
azure
):kubers.jacops.pl/agent-provider: "<provider-name>"
This annotation can be optional if the provider is set globally in the
kubers
deployment. -
To configure secret injection, please add the following annotation:
kubers.jacops.pl/agent-inject-secret-<unique-name>: "<service-type>://[<service-name>/]<key-name>"
unique-name
- the filename of the rendered secret and must be unique if multiple secrets are defined by the user.service-type
- Type of a service used for retrieving the secret. For example:keyvault
service-name
(optional for some services) - Name of a remote service where the secret is stored.key-name
- Key name under which the secret is stored in the remote service.
Deployment example:
spec:
template:
metadata:
annotations:
kubers.jacops.pl/agent-provider: "azure"
kubers.jacops.pl/agent-inject: "true"
kubers.jacops.pl/agent-inject-secret-htpasswd: keyvault://examplekv/nginx-htpasswd
The secret should be available from the main container in /vault/secret/<unique-name>
.
Below is a table containing other kubers annotations.
Annotation | Description |
---|---|
kubers.jacops.pl/agent-provider-azure-credentials-secret |
Secret with Azure credentials. See Authentication section for more info. |
kubers.jacops.pl/agent-provider-aws-credentials-secret |
Secret with AWS credentials. See Authentication section for more info. |
kubers.jacops.pl/agent-provider-aws-region |
AWS Region. Optional if region is set globally. |
kubers.jacops.pl/agent-image |
Overrides a default docker image for an agent. |
kubers.jacops.pl/secret-volume-path |
Specifies where the secrets are to be mounted after fetching. |
kubers.jacops.pl/secret-volume-path-<unique-name> |
Specifies where the <unique-name> secret is going to be mounted after fetching. |
kubers.jacops.pl/preserve-secret-case |
If enabled will preserve the case of secret name. By default the name is converted to lower case. |
kubers.jacops.pl/preserve-secret-case-<unique-name> |
If enabled will preserve the case of <unique-name> secret name. By default the name is converted to lower case. |
kubers.jacops.pl/agent-log-level |
Overrides log level for agent. Possible values: debug , info , error |
kubers.jacops.pl/agent-log-format |
Overrides log format for agent. Possible values: standard , json |
Every secrets manager service requires a user to authenticate against. While this responsibility is offloaded from your application, the sidecar container still needs to do this.
Below is the guide on how to authenticate against different service providers.
There are two ways to authenticate against Azure KeyVault. Service Principal and Managed Identity.
Using a system/user assigned identity has many benefits and in my opinion the main one is that you don't have to use any credentials and worry about secrets rotation.
To use Azure managed identities with your Kubernetes cluster, you need to install AAD Pod Identity
: https://github.com/Azure/aad-pod-identity and assign some identities to pods as per instructions.
Obviously this will only work in AKS and AKS-engine based clusters.
This method requires you to create a service principal and a Kubernetes secret with the credentials, from which the sidecar container can authenticate itself against a KeyVault.
Using service principal is not recommended and should be only used in development or if you are in a non Azure environment.
To configure kubers agent to use service principal authentication, please add the following annotation to your pod:
kubers.jacops.pl/agent-provider-azure-credentials-secret: "<secret-name-of-the-sp-credentials>"
secret-name-of-the-sp-credentials
secret should be structured as below:
data:
clientId: xxx
clientSecret: xxx
subscriptionId: xxx
tenantId: xxx
The agent injector supplies the sp credentials to the sidecar via environmental variables. While this is not the greatest method, it works well with
azure-sdk-for-go
. This however, can be refactored in the future.
There are two ways to authenticate against AWS Secrets Manager. API Access Keys and IAM role.
This authentication method is recommended as it doesn't require a user to distribute API access keys and worry about rotation and access to them.
To use kubers
with IAM roles, a user needs to install an application like: https://github.com/jtblin/kube2iam.
No extra configuration is needed on kubers
side.
This method requires you to create a pair of API access keys and a Kubernetes secret with the credentials, using which the sidecar container can authenticate itself against a secrets Manager.
Using API Access Keys is not recommended and should be only used in development or if you are in a non AWS environment.
To configure kubers
agent to use API Access Keys for authentication, please add the following annotation to your pod:
kubers.jacops.pl/agent-provider-aws-credentials-secret: "<secret-name>"
<secret-name>
secret should be structured as below:
data:
accessKeyId: xxx
secretAccessKey: xxx
Please go to examples
folder.
This repository is heavily inspired by https://github.com/hashicorp/vault-k8s. Huge kudos to the Hashicorp folks for the work they have done around the Vault integration with Kubernetes.