Skip to content

Example how use Vault Agent for inject secrets in pods before starting, and how a dotnet application can be reading these secrets. Source: https://learn.hashicorp.com/tutorials/vault/kubernetes-sidecar?in=vault/kubernetes

Notifications You must be signed in to change notification settings

leoguilen/vault-injector_dotnet-app-demo

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Injecting Secrets into Kubernetes Pods via Vault Agent and Read These Secrets in .NET Applications

Example how use Vault Agent for inject secrets in pods before starting, and how a dotnet application can be reading these secrets. Source: https://learn.hashicorp.com/tutorials/vault/kubernetes-sidecar?in=vault/kubernetes

Getting started

First, install make CLI for test this project

Windows
$ choco install make
Linux
$ apt-get install -y make

Run the project (Ensure you have kubectl and helm cli installed)

$ make

Test if the application can read the secret

$ curl "http://<expose-url>:<available-port>/secret"
{"secretValue":"vault"} # <- Expected output