-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New component: Vault Config Source #24173
Comments
This issue has been inactive for 60 days. It will be closed in 60 days if there is no activity. To ping code owners by adding a component label, see Adding Labels via Comments, or if you are unsure of which component this issue relates to, please ping |
This issue has been closed as inactive because it has been stale for 120 days with no activity. |
It would be great to get added. |
cc: @MovieStoreGuy based on your sig comment about secrets management. The current requirement to shim all confmap.Provider settings via resolver uris is tricky for nontrivial configuration though, and reconciling that w/ the proposed config source interface is the main challenge w/ rfes like this tmk. |
This issue has been inactive for 60 days. It will be closed in 60 days if there is no activity. To ping code owners by adding a component label, see Adding Labels via Comments, or if you are unsure of which component this issue relates to, please ping |
This issue has been closed as inactive because it has been stale for 120 days with no activity. |
+1 for this. What's stopping us from moving forward on this? |
The purpose and use-cases of the new component
This component currently exists in the Splunk OpenTelemetry Collector distribution: https://github.com/signalfx/splunk-otel-collector/tree/main/internal/configsource/vaultconfigsource
Use the Vault config source to retrieve data from
Vault and inject it into your collector configuration. It supports:
Example configuration for the component
Under the
config_sources:
usevault:
orvault/<name>:
to create a Vault configsource. The following parameters are available to customize Vault config sources:
If multiple paths are needed create different instances of the config source, example:
Note: When using the Key/Value V2 secret engine, all data will be nested under a
separate data map within the secret, e.g.
data
andmetadata
, to access specifickeys specify the "map" and the "key" using a
.
as separator, eg:data.username
.Telemetry data types supported
N/A
Is this a vendor-specific component?
Sponsor (optional)
No response
Additional context
No response
The text was updated successfully, but these errors were encountered: