-
Updated
Nov 14, 2020 - Go
vault
Here are 917 public repositories matching this topic...
-
Updated
Nov 15, 2020 - Go
-
Updated
Nov 13, 2020 - Java
-
Updated
Oct 28, 2020 - Go
In https://github.com/godaddy/kubernetes-external-secrets/blob/master/charts/kubernetes-external-secrets/values.yaml
imagePullSecrets is child of image:
image:
repository: godaddy/kubernetes-external-secrets
tag: 6.0.0
pullPolicy: IfNotPresent
imagePullSecrets: []
but it templates/deployment.yaml:
it is referenced like
{{- if .Values.imagePullSecrets }
Hi,
thank you for the library. It really improved the way I approach configuration files.
Finally I have types and proper sections.
What I am missing is schema: I would love to be able to enforce that some parameters are obligatory, their type and provide a description, also raise an exception if there is some unknown parameter is configured.
I think I could use something like marshmallow
Is your feature request related to a problem? Please describe.
Vault has backends for AWS like dynamo and s3. However to use them you should provide credentials. AWS support 2 solutions to eliminate this. IAM roles for Service Accounts and Instance profile roles.
Due to some unknown reason vault requires more time to start when using dynamic creds than explicit definition keys in s3 block o
-
Updated
Nov 14, 2020 - Go
When specifying a vault URL, it should be possible to request round-robin discovery if the first returned vault is still sealed.
i.e.
http://vault.example.org
might resolve to several addresses 10.11.11.2,10.11.11.4,10.11.11.5,10.11.11.6,10.11.11.7
.
Currently if the client gets handed 1 address by DNS and it happens to be sealed, an exception is thrown. It would be convenient if the c
-
Updated
Mar 11, 2020 - Go
-
Updated
Oct 28, 2020 - Go
-
Updated
Mar 10, 2017 - Perl
-
Updated
Oct 31, 2020 - HCL
-
Updated
Nov 15, 2020 - Java
-
Updated
Nov 4, 2020 - JavaScript
-
Updated
Apr 6, 2018 - Python
-
Updated
Feb 4, 2020 - HTML
-
Updated
Nov 13, 2020 - Java
-
Updated
Aug 19, 2020 - Go
-
Updated
Feb 18, 2019 - Go
-
Updated
Oct 11, 2020
Improve this page
Add a description, image, and links to the vault topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the vault topic, visit your repo's landing page and select "manage topics."
Consul Template version
v0.25.1
Expected behavior
Consul-template supports logging to file. Consul-template can be started as a service on Windows, and the resultant messages can be inspected. Consul offers
-log-file
via stdarg and Nomad offerslog_file
in the config.Actual behavior
Consul-template only supports Syslog and stdout/stderr logging mechanisms. Windows d