-
Notifications
You must be signed in to change notification settings - Fork 17
Description
Problem Statement
Currently, there is no way to allow node-specific secrets similar to how the YAML backend works in Puppet. This issue was brought to my attention through GitHub issue #142.
Proposal
Implement the ability to configure a custom "hierarchy" in which lookups can be performed to support node-specific secrets.
Key Considerations
Performance/Cost
The following key considerations must be taken into account for the implementation of this feature:
- Reduce costs for large environments.
- Keep catalog compilation/runs fast.
- Reduce the rate of hitting rate limits.
Note: Currently, there is a maximum of 2,000 lookups every 10 seconds allowed against a Key Vault (Standard Tier) and 4,000 lookups every 10 seconds allowed against a Key Vault (Premium Tier).
Alternative to other usage
This is not meant to replace or deprecate the current functionality of Hiera in this module. Instead, it's meant to be another way in which this module can be used if more flexibility is needed.
Proposed Solution
- name: 'Azure Key Vault Secrets'
lookup_key: azure_key_vault::lookup
options:
vault_name: secrets-vault
vault_api_version: '2016-10-01'
metadata_api_version: '2018-04-02'
key_replacement_token: '-'
prefixes:
- nodes--%{trusted.hostname}--
- common--
confine_to_keys:
- '^azure_.*'