THIS TOPIC IS NO LONGER USED

To connect client apps to the Config Server, Spring Cloud Services uses Spring Cloud Connectors, including the Spring Cloud Cloud Foundry Connector, which discovers services bound to apps running in Cloud Foundry.

Application configuration

When the connector detects a Config Server service instance which has been bound to the app, it will automatically set the spring.cloud.config.uri property in the client app's environment, using the URL provided in the Config Server instance's binding credentials. The connector will also set additional security properties to allow the client app to access the Config Server service instance.

HashiCorp Vault token renewal

When Spring's scheduled task execution support is activated in a client app (using the @EnableScheduling annotation) and the SPRING_CLOUD_CONFIG_TOKEN environment variable (or the spring.cloud.config.token property) is set on the app, the connector allows automatic token renewal for a HashiCorp Vault client token. By default, the token's Time To Live (TTL) is set at 300000 milliseconds and the connector automatically renews the app's token every 60000 milliseconds.

You can configure the token's TTL and the renewal interval using properties under vault.token, set in the application.yml or application.properties file. The TTL is set using the vault.token.ttl property and the renewal interval is set using the vault.token.renew.rate property.

The following YAML sets the token TTL to 600000 milliseconds (10 minutes) and sets the renewal interval to 180000 milliseconds (three minutes).

vault:
  token:
    ttl: 600000
    renew:
      rate: 180000

HashiCorp Vault property source redaction

In the Spring Boot Actuator /actuator/env endpoint, property names and values from a HashiCorp Vault property source are redacted for security. By default, the connector redacts properties whose names begin with configService:vault:, and they are displayed in the output of /actuator/env as shown in the following example:

"configService:vault:game": {
    "******": "Properties from this source are redacted for security reasons"
},

You can configure the pattern used to determine which properties to redact, as well as the message displayed in place of those properties' values, using properties set in the application.yml or application.properties file. The pattern is set using the endpoints.env.mask.sourceNamePatterns property (wildcards, written as *, are allowed) and the message is set using the endpoints.env.mask.message property.

For example, the following YAML sets the redacted property name pattern to match property sources whose names begin with configService: and sets the message to Redacted for security.

endpoints:
  env:
    mask:
      sourceNamePatterns: "configService:"
      message: "Redacted for security"

Resources

For more information about Spring Cloud Connectors, see:

check-circle-line exclamation-circle-line close-line
Scroll to top icon