SkillAgentSearch skills...

Kubers

Kubers - Kubernetes Remote Secrets. Annotation based sidecar injection for secrets fetching from Azure KeyVault or AWS Secret Manager

Install / Use

/learn @jacops/Kubers
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

Kubers - Kubernetes Remote Secrets

Build Status Release GitHub go.mod Go version Go Report Card codecov Docker Image Size (latest by date) Docker Pulls GitHub

Kubers is a simple implementation of a SecOps pattern, where a sidecar or init container is responsible for retrieving secrets from services like Azure KeyVault and making them available to the user's application via shared memory volume.

Diagram

Supported providers and services

  • Azure (KeyVault)
  • AWS (Secrets Manager)

Installation

Kustomize

kubectl apply -k git@github.com:jacops/kubers.git

Helm

Please go to ./chart folder for instructions and available configuration.

Usage

  1. Enable agent injection by adding the following annotation:

    kubers.jacops.pl/agent-inject: "true"
    
  2. Set agent provider by adding the following annotation (for example azure):

    kubers.jacops.pl/agent-provider: "<provider-name>"
    

    This annotation can be optional if the provider is set globally in the kubers deployment.

  3. To configure secret injection, please add the following annotation:

    kubers.jacops.pl/agent-inject-secret-<unique-name>: "<service-type>://[<service-name>/]<key-name>"
    
    • unique-name - the filename of the rendered secret and must be unique if multiple secrets are defined by the user.
    • service-type - Type of a service used for retrieving the secret. For example: keyvault
    • service-name (optional for some services) - Name of a remote service where the secret is stored.
    • key-name - Key name under which the secret is stored in the remote service.

Deployment example:

spec:
  template:
    metadata:
      annotations:
        kubers.jacops.pl/agent-provider: "azure"
        kubers.jacops.pl/agent-inject: "true"
        kubers.jacops.pl/agent-inject-secret-htpasswd: keyvault://examplekv/nginx-htpasswd

The secret should be available from the main container in /vault/secret/<unique-name>.

Advanced Configuration

Below is a table containing other kubers annotations.

| Annotation | Description | |---|---| | kubers.jacops.pl/agent-provider-azure-credentials-secret | Secret with Azure credentials. See Authentication section for more info. | | kubers.jacops.pl/agent-provider-aws-credentials-secret | Secret with AWS credentials. See Authentication section for more info. | | kubers.jacops.pl/agent-provider-aws-region | AWS Region. Optional if region is set globally. | | kubers.jacops.pl/agent-image | Overrides a default docker image for an agent. | | kubers.jacops.pl/secret-volume-path | Specifies where the secrets are to be mounted after fetching. | | kubers.jacops.pl/secret-volume-path-<unique-name> | Specifies where the <unique-name> secret is going to be mounted after fetching. | | kubers.jacops.pl/preserve-secret-case | If enabled will preserve the case of secret name. By default the name is converted to lower case. | | kubers.jacops.pl/preserve-secret-case-<unique-name> | If enabled will preserve the case of <unique-name> secret name. By default the name is converted to lower case. | | kubers.jacops.pl/agent-log-level | Overrides log level for agent. Possible values: debug, info, error | | kubers.jacops.pl/agent-log-format | Overrides log format for agent. Possible values: standard, json |

Authentication

Every secrets manager service requires a user to authenticate against. While this responsibility is offloaded from your application, the sidecar container still needs to do this.

Below is the guide on how to authenticate against different service providers.

Azure

There are two ways to authenticate against Azure KeyVault. Service Principal and Managed Identity.

Managed Identity (recommended)

Using a system/user assigned identity has many benefits and in my opinion the main one is that you don't have to use any credentials and worry about secrets rotation.

To use Azure managed identities with your Kubernetes cluster, you need to install AAD Pod Identity: https://github.com/Azure/aad-pod-identity and assign some identities to pods as per instructions.

Obviously this will only work in AKS and AKS-engine based clusters.

Service Principal

This method requires you to create a service principal and a Kubernetes secret with the credentials, from which the sidecar container can authenticate itself against a KeyVault.

Using service principal is not recommended and should be only used in development or if you are in a non Azure environment.

To configure kubers agent to use service principal authentication, please add the following annotation to your pod:

kubers.jacops.pl/agent-provider-azure-credentials-secret: "<secret-name-of-the-sp-credentials>"

secret-name-of-the-sp-credentials secret should be structured as below:

data:
  clientId: xxx
  clientSecret: xxx
  subscriptionId: xxx
  tenantId: xxx

The agent injector supplies the sp credentials to the sidecar via environmental variables. While this is not the greatest method, it works well with azure-sdk-for-go. This however, can be refactored in the future.

AWS

There are two ways to authenticate against AWS Secrets Manager. API Access Keys and IAM role.

IAM role (recommended)

This authentication method is recommended as it doesn't require a user to distribute API access keys and worry about rotation and access to them.

To use kubers with IAM roles, a user needs to install an application like: https://github.com/jtblin/kube2iam.

No extra configuration is needed on kubers side.

API Access Keys

This method requires you to create a pair of API access keys and a Kubernetes secret with the credentials, using which the sidecar container can authenticate itself against a secrets Manager.

Using API Access Keys is not recommended and should be only used in development or if you are in a non AWS environment.

To configure kubers agent to use API Access Keys for authentication, please add the following annotation to your pod:

kubers.jacops.pl/agent-provider-aws-credentials-secret: "<secret-name>"

<secret-name> secret should be structured as below:

data:
  accessKeyId: xxx
  secretAccessKey: xxx

Examples

Please go to examples folder.

Disclaimer

This repository is heavily inspired by https://github.com/hashicorp/vault-k8s. Huge kudos to the Hashicorp folks for the work they have done around the Vault integration with Kubernetes.

Related Skills

View on GitHub
GitHub Stars8
CategoryDevelopment
Updated3y ago
Forks1

Languages

Go

Security Score

70/100

Audited on Sep 14, 2022

No findings