It enables integration with a known secrets manager, allowing the connection environment variable to be dynamically expanded for each connection.
_aws:SECRET-NAME:SECRET-KEY
_aws:pgprod:PG_HOST
_aws:pgprod:PG_PORT
bash
connection.
env
command to dump the environment variables of a session.
Name | Required | Description |
---|---|---|
VAULT_ADDR | yes | Address of the Vault server expressed as a URL and port, for example: https://127.0.0.1:8200/ . |
VAULT_TOKEN | yes* | Vault authentication token. Conceptually similar to a session token on a website, the VAULT_TOKEN environment variable holds the contents of the token. It’s required if App Role authentication is not being used. |
VAULT_APP_ROLE_ID | no | The Role ID in case App Role Authentication is used. |
VAULT_APP_ROLE_SECRET_ID | no | The Secret ID in case App Role Authentication is used. |
VAULT_CACERT | no | Path or inline base64 content of PEM-encoded CA certificate file on the local disk. This file is used to verify the Vault server’s SSL certificate. |
VAULT_CACERT
POST /auth/approle/login
and obtain a valid token to access secrets in Vault Key Value store.
Make sure to configure the environment variables when deploying the agent:
batch
tokens when using the App Role method.
Refer to Vault App Role documentation for more information.Install Vault
-dev-listen-address="0.0.0.0:8200"
to expose the Vault Server to your host network.Configure Secrets
_vaultkv1:SECRETNAME:SECRET-KEY
Testing
_envjson:MYJSON_ENV:ENVKEY
ENV_CONFIG='{"PG_HOST": "127.0.0.1", "PG_DB": "testdb"}'
_envjson:ENVCONFIG:PG_HOST
bash
connection.
env
command to dump the environment variables of a session.