You are looking at the documentation of a prior release. To read the documentation of the latest release, please
visit here.
New to KubeVault? Please start here.
VaultPolicyBinding
What is VaultPolicyBinding
A VaultPolicyBinding
is a Kubernetes CustomResourceDefinition
(CRD) which binds Vault server policies to an auth method role in a Kubernetes native way.
When a VaultPolicyBinding
is created, the KubeVault operator will create an auth role according to CRD (CustomResourceDefinition) specification.
If the user deletes the VaultPolicyBinding CRD, then the respective role will also be deleted from Vault.
Auth method roles are associated with an authentication type/entity and a set of Vault policies. Currently supported auth methods for VaultPolicyBinding:
- Kubernetes Auth Method: The Kubernetes auth method can be used to authenticate with Vault using a Kubernetes Service Account Token. This method of authentication makes it easy to introduce a Vault token into a Kubernetes Pod.
VaultPolicyBinding CRD Specification
Like any official Kubernetes resource, a VaultPolicyBinding
object has TypeMeta
, ObjectMeta
, Spec
and Status
sections.
A sample VaultPolicyBinding
object is shown below:
apiVersion: policy.kubevault.com/v1alpha1
kind: VaultPolicyBinding
metadata:
name: admin-role
namespace: demo
spec:
vaultRef:
name: vault
policies:
- ref: secret-admin
subjectRef:
kubernetes:
serviceAccountNames:
- "demo sa"
serviceAccountNamespaces:
- "demo"
ttl: "1000"
maxTTL: "2000"
period: "1000"
status:
observedGeneration: 1
phase: Success
Here, we are going to describe the various sections of the VaultPolicyBinding
crd.
VaultPolicyBinding Spec
VaultPolicyBinding spec
contains information that is necessary for creating an auth role.
spec:
vaultRef:
name: <vault-appbinding-name>
vaultRoleName: <role-name>
policies:
- name: <vault-policy-name>
ref: <VaultPolicy-crd-name>
subjectRef:
kubernetes:
path: <k8s-auth-path>
serviceAccountNames:
- "sa1"
- "sa2"
serviceAccountNamespaces:
- "ns1"
ttl: <token-ttl>
maxTTL: <token-maxTTL>
period: <token-period>
VaultPolicyBinding spec has the following fields:
spec.vaultRef
spec.vaultRef
is a required
field that specifies the name of an AppBinding that contains information to communicate with a Vault server. The AppBinding object must be in the same namespace with VaultPolicyBinding object.
spec:
vaultRef:
name: vault-app
spec.vaultRoleName
To avoid naming conflict, KubeVault operator will generate role names in Vault server in this format: k8s.{clusterName}.{metadata.namespace}.{metadata.name}
. spec.vaultRoleName
is an optional
field. If set, it will be used instead of the auto-generated role name.
spec:
vaultRoleName: my-custom-role
spec.policies
spec.policies
is a required
field that specifies a list of vault policy references. Each item of the list
can be either a vault policy name or VaultPolicy CRD name.
name
: Specifies the vault policy name. This name should be returned byvault read sys/policy
command.ref
: Specifies the name of VaultPolicy crd object. The KubeVault operator will get the vault policy name from the crd object.
spec:
policies:
- name: policy1
- ref: policy2
spec.subjectRef
spec.subjectRef
is a required
field that specifies the reference of vault users who will be granted
token with mentioned policies.
kubernetes
: Refers to vault users who will be authenticated via the Kubernetes auth method.path
:Optional
. Specifies the path where the Kubernetes auth is enabled. The default value iskubernetes
.serviceAccountNames
:Required
. Specifies the list of service account names. They will have access to use this role. If set to"*"
all names are allowed, both this and serviceAccountNamespaces cannot be"*"
.serviceAccountNamespaces
:Required
. Specifies a list of namespaces allowed to access this role. This value set to “*” means all namespaces are allowed.ttl
:Optional
. Specifies the TTL period of the token issued using this role in seconds. Default value “0”.maxTTL
:Optional
. Specifies the maximum allowed lifetime of tokens issued in seconds using this role.period
:Optional
. If set indicates that the token generated using this role should never expire. The token should be renewed within the duration specified by this value. At each renewal, the token’s TTL will be set to the value of this parameter.
spec:
subjectRef:
kubernetes:
serviceAccountNames:
- "sa1"
- "sa2"
serviceAccountNamespaces:
- "demo"
ttl: "1000"
maxTTL: "2000"
period: "1000"
VaultPolicyBinding Status
status
shows the status of a VaultPolicyBinding. It is managed by the KubeVault operator. It contains the following fields:
observedGeneration
: Specifies the most recent generation observed for this resource. It corresponds to the resource’s generation, which is updated on mutation by the API Server.phase
: Indicates whether the role successfully created in the Vault or not.conditions
: Represents the latest available observations of a VaultPolicyBinding’s current state.