mirror of
https://github.com/hashicorp/vault.git
synced 2025-08-09 08:07:01 +02:00
* VAULT-19278 First draft of static secret caching docs * VAULT-19278 Add warning to Agent docs, fix capitalization * VAULT-19278 typos/formatting * VAULT-19278 changelog * VAULT-19278 update based on PR feedback * VAULT-19278 review feedback * VAULT-19278 Update based on review * VAULT-19278 update based on PR feedback * VAULT-19278 incorporate a lot of PR feedback * VAULT-19278 Rest of the suggestions * VAULT-19278 I missed a suggestion * VAULT-19278 More updates * VAULT-19278 add docs for disable dynamic secret caching * VAULT-19278 update changelog * VAULT-19278 update based on comments
23 lines
1.0 KiB
Plaintext
23 lines
1.0 KiB
Plaintext
---
|
|
layout: docs
|
|
page_title: Kubernetes - Vault Proxy Persistent Cache
|
|
description: Kubernetes Persistent Cache for Vault Proxy Caching
|
|
---
|
|
|
|
# Vault Proxy kubernetes persistent cache
|
|
|
|
When `kubernetes` is configured for the persistent cache type, Vault Proxy will optimize the
|
|
persistent cache specifically for Kubernetes. This type of persistent cache requires a Kubernetes
|
|
service account token. The service account token is used during encryption and decryption of the
|
|
persistent cache as an additional integrity check.
|
|
|
|
The Vault Proxy persistent cache file in Kubernetes should only be used for handing off Vault tokens
|
|
and leases between initialization and sidecar Vault Proxy containers. This cache file should be shared
|
|
using a memory volume between the Vault Proxy containers.
|
|
|
|
## Configuration
|
|
|
|
- `service_account_token_file` `(string: optional)` - When type is set to `kubernetes`,
|
|
this configures the path on disk where the Kubernetes service account token can be found.
|
|
Defaults to `/var/run/secrets/kubernetes.io/serviceaccount/token`.
|