This repository has been archived by the owner on Nov 20, 2024. It is now read-only.
Support for secrets from Azure KeyVault (and potentially other secret management backends) #140
Labels
enhancement
New feature or request
Community Note
Description
At this time, the only possibility to manage secrets as via K8s secrets and referenced in CRD.
We're looking to expand the secrets management capabilities to include reading secrets from Azure KeyVaults.
Potential Terraform Configuration
The proposed change could take a form as part of CRD manifest as the following:
Variable behaviour goes as:
value
not specified as part of the block - usual route: read secret's value from k8s secretvalue
specified as part of the block (i.e.value: azurekeyvault@my-secret
) parse it and pull the secret from specified secrets back-end, in this caseazurekeyvault
.This could be expanded further to support multiple back-ends such as AWS KMS, HC Vault, etc.
References
n/a
The text was updated successfully, but these errors were encountered: