Package :



Table of Contents


Field Type Label Description
caPath string ca_path is the mount path of the Vault PKI backend's sign endpoint, e.g: “my_pki_mount/sign/my-role-name”.
csrPath string csr_path is the mount path of the Vault PKI backend's generate endpoint, e.g: “my_pki_mount/intermediate/generate/exported”. “exported” is necessary here as istio needs access to the private key See vault docs here:
server string Server is the connection address for the Vault server, e.g: “".
caBundle bytes PEM encoded CA bundle used to validate Vault server certificate. Only used if the Server URL is using HTTPS protocol. This parameter is ignored for plain HTTP protocol connection. If not set the system root certificates are used to validate the TLS connection.
namespace string Name of the vault namespace. Namespaces is a set of features within Vault Enterprise that allows Vault environments to support Secure Multi-tenancy. e.g: “ns1” More about namespaces can be found here
tokenSecretRef TokenSecretRef authenticates with Vault by presenting a token.
kubernetesAuth Kubernetes authenticates with Vault by passing the ServiceAccount token stored in the named Secret resource to the Vault server.


Field Type Label Description
mountPath string The Vault mountPath here is the mount path to use when authenticating with Vault. For example, setting a value to /v1/auth/foo, will use the path /v1/auth/foo/login to authenticate with Vault. If unspecified, the default value “/v1/auth/kubernetes” will be used.
role string A required field containing the Vault Role to assume. A Role binds a Kubernetes ServiceAccount with a set of Vault policies.
secretTokenKey string Key to search for the sa_token Default to “token”
serviceAccountRef Reference to service account, other than the one mounted to the current pod.
mountedSaPath string File System path to grab the service account token from. Defaults to /var/run/secrets/