# Integrating MetalSoft with Hashicorp Vault To integrate MetalSoft with Hashicorp Vault, please follow these instructions if Vault was not enabled as part of the original installation. Apply default secret and configmap: ``` kubectl -n $ns apply -f scripts/vault-secrets.yaml ``` Once Vault is unsealed, run `./scripts/vault_start_agent.sh`, which will: + enable Vault approle + overwrite vault-metalsoft-policy.hcl with capabilities for specific paths + apply policies for Metalsoft + set approle role_id and secret_id + update and apply vault-secrets.yaml Once the above is completed, few of the manifests will need to be updated to use the Vault agent: ``` # grep enable_vault * auth-deployment.yaml:### NOTE: enable_vault auth-deployment.yaml:### NOTE: enable_vault auth-deployment.yaml:### NOTE: enable_vault configmaps.yaml:### NOTE: enable_vault inventory-deployment.yaml:### NOTE: enable_vault ``` These sections need to be uncommented, and YAML files applied to k8s