Skip to content
This repository was archived by the owner on Feb 17, 2025. It is now read-only.

Latest commit

 

History

History

7-credential-stores

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 

Loading credential-stores.properties from a Secret

This example shows how to load a credential-stores.properties file from a Secret. This technique is useful if you have different credential stores in different environments (for example, Dev, QA, Prod) and want each environment's SDCs to automatically load the appropriate settings.

Start by creating a credential-stores.properties file. For example, a credential-stores.properties file used for Azure Key Vault might look like this:

credentialStores=azure
credentialStore.azure.def=streamsets-datacollector-azure-keyvault-credentialstore-lib::com_streamsets_datacollector_credential_azure_keyvault_AzureKeyVaultCredentialStore
credentialStore.azure.config.credential.refresh.millis=30000
credentialStore.azure.config.credential.retry.millis=15000
credentialStore.azure.config.vault.url=https://mykeyvault.vault.azure.net/
credentialStore.azure.config.client.id=[redacted]
credentialStore.azure.config.client.key=[redacted]

Store the credential-stores.properties file in a Secret; I'll name my secret azure-key-vault-credential-store:

$ kubectl create secret generic azure-key-vault-credential-store --from-file=credential-stores.properties 

In your SDC deployment manifest, create a Volume for the Secret:

volumes:
- name: azure-key-vault-credential-store
  secret:
    secretName: azure-key-vault-credential-store

And then create a Volume Mount that overwrites the default credential-stores.properties file:

volumeMounts:
- name: azure-key-vault-credential-store
  mountPath: /etc/sdc/credential-stores.properties
  subPath: credential-stores.properties

See sdc.yaml for an example manifest.

Make sure to load the Azure Key Vault Credentials Store stage library in your deployment to order to run this example.