Vault

Functionality

Overview

Hashicorp Vault is used by the Axual Platform to reliably store sensitive data, for example:

  • Super User credentials of all Kafka clusters managed by Self Service

  • Admin credentials of all Schema Registry managed by Self Service

  • Application authentication used to connect to all Kafka clusters

README & Changelog

The Vault charts are taken from Hashicorp and are not changed by Axual.

API

No direct interaction with the Vault should be necessary.

Installation

Vault is a standalone component that is not dependent on another component. In a production setting, a managed Vault is preferred over installation via these charts.

Ask for an Enterprise Vault or another Managed Vault solution before considering installing Vault via Helm.

Helm Charts

As part of the Governance charts, the component can be installed following the guide Axual Streaming & Governance Installation.

Configuration

Vault setup

The configuration of Vault is described in page Hashicorp Vault setup

Helm configuration

Vault auto unseal

It is possible to configure Vault with auto unseal, so that when Vault Pods are restarted (for example during Kubernetes upgrade), the Pods will be unsealed without human interaction.

If no auto unseal is enabled, there will be manual steps during a Kubernetes migration.

Logging

Vault is not an Axual component nor written in Java, so Vault logs will be formatted differently than the other components.
Log configurations are not described here, because the use of a managed Hashicorp Vault is expected. The log configurations should be done by the responsible team.

Metrics

Everything in the logging section above applies to metrics as well.