Spring Cloud Services Config provides a HashiCorp Vault backend so that the Spring Cloud Config Server can serve configuration stored in Vault. The Spring Cloud Services Config Server supports this backend and can serve configuration stored in Vault to client apps which have been given access to the Vault server (this includes provision of a Vault access token for the client app).

HashiCorp Vault is a secrets management tool, which encrypts and stores credentials, API keys, and other secrets for use in distributed systems. It provides support for access control lists, secret revocation, auditing, and leases and renewals, and includes special capabilities for common infrastructure and systems such as AWS, MySQL, and RabbitMQ, among others. For more information about Vault, see the documentation.

Spring Cloud Services does not provide a HashiCorp Vault server. You must provide your own Vault server in order to use Config Server with Vault.

See below for information about configuring a Config Server service instance to use a HashiCorp Vault server.

General configuration

Parameters used to configure a HashiCorp Vault server are part of a JSON object called vault, as in {"vault": { "host": "127.0.0.1", "port": 8200 } }.

The Spring Cloud Services Config Server supports only one Vault backend, so only one vault object is permitted in the configuration parameters.

General parameters used to configure the Config Server to use a Vault server are listed below.

Parameter Function
host The host of the Vault server
port The port of the Vault server
kvVersion The Vault API version to use (values `1` or `2`). (default value: `1`)
scheme The URI scheme used in accessing the Vault server. Default value: http
backend The name of the Vault backend from which to retrieve configuration. Default value: secret
defaultKey The default key from which to retrieve configuration. Default value: application
profileSeparator The value used to separate profiles. Default value: ,
skipSslValidation Whether to skip validation of the SSL certificate on the Vault server. Valid values: true, false

For information about writing a client app that accesses configuration values from a Config Server which has been configured to use Vault, see the Use a HashiCorp Vault Server section of Writing Client Applications.

HTTP(S) proxy repository access

You can configure a Config Server service instance to access a HashiCorp Vault server using an HTTP or HTTPS proxy. To do so, you must provide proxy settings in either of the vault.proxy.http or vault.proxy.https JSON objects. You can set the proxy host and port, the proxy username and password (if applicable), and a list of hosts which the Config Server should access outside of the proxy.

Settings for an HTTP proxy are set in the vault.proxy.http object. These might be set as shown in the following command:

cf create-service p.config-server standard config-server -c '{"vault": { "proxy": { "http": { "host": "proxy.example.com", "port": 80 } } } }'

Settings for an HTTPS proxy are set in the vault.proxy.https object. These might be set as shown in the following command:

cf create-service p.config-server standard config-server -c '{"vault": { "proxy": { "https": { "host": "secure.example.com", "port": 443 } } } }'

Some networks require that separate proxy servers are used for HTTP and HTTPS URLs. In such a case, you can set both the proxy.http and proxy.https objects.

The parameters used to configure HTTP or HTTPS proxy settings for the Config Server are listed below.

Parameter Function
proxy.http A proxy object, containing HTTP proxy fields
proxy.http.host The HTTP proxy host
proxy.http.port The HTTP proxy port
proxy.http.nonProxyHosts The hosts to access outside the HTTP proxy
proxy.http.username The username to use with an authenticated HTTP proxy
proxy.http.password The password to use with an authenticated HTTP proxy
proxy.https A proxy object, containing HTTPS proxy fields
proxy.https.host The HTTPS proxy host
proxy.https.port The HTTPS proxy port
proxy.https.nonProxyHosts The hosts to access outside the HTTPS proxy (if proxy.http.nonProxyHosts is also provided, http.nonProxyHosts will be used instead of https.nonProxyHosts)
proxy.https.username The username to use with an authenticated HTTPS proxy (if proxy.http.username is also provided, http.username will be used instead of https.username)
proxy.https.password The password to use with an authenticated HTTPS proxy (if proxy.http.password is also provided, http.password will be used instead of https.password)

To configure a Config Server service instance that uses an HTTP proxy to access a Vault server, use the following command:

cf create-service p.config-server standard config-server -c '{"vault": { "host": "127.0.0.1", "port": 8200, "proxy": { "http": { "host": "proxy.example.com", "port": 80 } } } }'

To configure a Config Server service instance that uses an authenticated HTTPS proxy to access a Vault server, specifying that example.com should be accessed outside of the proxy, use the following command:

cf create-service p.config-server standard config-server -c '{"vault": { "host": "127.0.0.1", "port": 8200, "proxy": { "https": { "host": "secure.example.com", "port": 443, "username": "jim", "password": "wright62", "nonProxyHosts": "example.org" } } } }'
check-circle-line exclamation-circle-line close-line
Scroll to top icon