Integrating MetalSoft with Hashicorp Vault

To integrate MetalSoft with Hashicorp Vault, please follow these instructions if Vault was not enabled as part of the original installation.

Apply default secret and configmap:

kubectl -n $ns apply -f scripts/vault-secrets.yaml

Once Vault is unsealed, run ./scripts/vault_start_agent.sh, which will:

  • enable Vault approle

  • overwrite vault-metalsoft-policy.hcl with capabilities for specific paths

  • apply policies for Metalsoft

  • set approle role_id and secret_id

  • update and apply vault-secrets.yaml

Once the above is completed, few of the manifests will need to be updated to use the Vault agent:

# grep enable_vault *
auth-deployment.yaml:### NOTE: enable_vault
auth-deployment.yaml:### NOTE: enable_vault
auth-deployment.yaml:### NOTE: enable_vault
configmaps.yaml:### NOTE: enable_vault
inventory-deployment.yaml:### NOTE: enable_vault

These sections need to be uncommented, and YAML files applied to k8s