Skip to content

Commit

Permalink
Updates Vault docs
Browse files Browse the repository at this point in the history
Signed-off-by: kvmw <[email protected]>
  • Loading branch information
kvmw committed Sep 23, 2024
1 parent cf4768e commit ea77e10
Showing 1 changed file with 24 additions and 0 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -59,6 +59,12 @@ The following table describes configurable Vault properties:
|defaultKey
|application

|defaultLabel
|master (Only used when `enableLabel` is set to `true`)

|enableLabel
|false

|profileSeparator
|,

Expand Down Expand Up @@ -158,6 +164,24 @@ Properties written to `secret/application` are available to <<_vault_server,all
An application with the name, `myApp`, would have any properties written to `secret/myApp` and `secret/application` available to it.
When `myApp` has the `dev` profile enabled, properties written to all of the above paths would be available to it, with properties in the first path in the list taking priority over the others.

[[enabling-serach-by-label]]
== Enabling Search by Label

By default, Vault backend does not use the label when searching for secrets. You can change this by
setting the `enableLabel` feature flag to `true` and, optionally, setting the `defaultLabel`.
When `defaultLabel` is not provided `master` will be used.

When `enableLabel` feature flag is on, the secrets in Vault should always have all three segments(application name, profile and label) in their paths.
So the example in previous section, with enabled feature flag, would be like :

[source,sh]
----
secret/myApp,dev,myLabel
secret/myApp,default,myLabel # default profile
secret/application,dev,myLabel # default application name
secret/application,default,myLabel # default application name and default profile.
----

[[decrypting-vault-secrets]]
== Decrypting Vault Secrets in Property Sources

Expand Down

0 comments on commit ea77e10

Please sign in to comment.