Hi Adam,
Wesley's link to my post is my general answer. Others may chime in on
the list, but generally this involves a bit of do-it-yourselfery,
because each container orchestrator, runtime, and environment is quite
different (ECS vs Nomad vs Mesos/Marathon vs Kubernetes vs...)
Supporting each one and the specific setup of each one in any given
organization is difficult, so for now we generally opted towards
providing the security primitives that you need to code up the
solution that fits your bill (and often, this solution doesn't take
that much code).
Cubbyhole is generally meant for when your methods of getting an
initial secret to a box are not actually very secret. An example of
this is Docker environment variables -- those have a bad habit of
getting logged in, say, an orchestration tool's log files, because
generally it's good to have a record of that data. Cubbyhole lets you
pass in an ephemeral token containing the real token for the app, and
importantly provides detection of misuse by a third party. If you have
another way to securely access a container (for instance, if you have
SSH running inside) you could use that as a transport instead to
provide a token to a service in the container.
Others generate credentials on the host and pop them on different
bind-mounted filesystems (usually ramdisks), or simply generate a
token and place them into such a bind-mount. A couple of people have
worked on some Docker plugins, such as
https://github.com/calavera/docker-volume-vault. There are probably
other approaches out there, so maybe others will have more
suggestions!
Best,
Jeff
> --
> This mailing list is governed under the HashiCorp Community Guidelines -
>
https://www.hashicorp.com/community-guidelines.html. Behavior in violation
> of those guidelines may result in your removal from this mailing list.
>
> GitHub Issues:
https://github.com/hashicorp/vault/issues
> IRC: #vault-tool on Freenode
> ---
> You received this message because you are subscribed to the Google Groups
> "Vault" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to
vault-tool+...@googlegroups.com.
> To view this discussion on the web visit
>
https://groups.google.com/d/msgid/vault-tool/e2333ba5-1d70-48fd-86d1-d09ff56cd151%40googlegroups.com.
>
> For more options, visit
https://groups.google.com/d/optout.