Important Announcement!

This deprecated version of TLS Protect for Kubernetes, originally known as Jetstack Secure, will be PERMANENTLY SHUTDOWN on May 19, 2025. If you're still using this version, please work with your CyberArk/Venafi account team to transition to the current version of TLS Protect for Kubernetes.

Configuring venafi-connection

Learn about different ways to configure VenafiConnection custom resources.



Use Case: Loading Venafi Bearer Token from a Kubernetes Secret

This is the simplest authentication mechanism. In this case, the Venafi TPP access-token or Venafi-as-a-Service API Key are loaded from a Kubernetes Secret.

# 1. Create the Kubernetes Secret that contains the Venafi Bearer Token
apiVersion: v1
kind: Secret
metadata:
name: application-team-1-tpp-access-token
namespace: jetstack-secure
data:
access-token: XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX
Copy to clipboard
# 2. Give the 'venafi-connection' ServiceAccount the permission to read this secret
# create role that allows reading secrets for 'application-team-1'
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: get-application-team-1-tpp-access-token
namespace: jetstack-secure
rules:
- apiGroups: [ "" ]
resources: [ "secrets" ]
verbs: [ "get" ]
resourceNames: [ "application-team-1-tpp-access-token" ]
---
# link the connection service account to the 'get-application-team-1-tpp-access-token' role
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: application-team-1-secret-rolebinding
namespace: jetstack-secure
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: get-application-team-1-tpp-access-token
subjects:
- kind: ServiceAccount
name: venafi-connection
namespace: jetstack-secure
Copy to clipboard
# 3. Create the VenafiConnection CR that has a reference to the Venafi Control Plane server and to the Venafi Bearer Token
apiVersion: jetstack.io/v1alpha1
kind: VenafiConnection
metadata:
name: application-team-1-connection
namespace: jetstack-secure
spec:
tpp:
url: https://tpp1.example.com
accessToken:
- secret:
name: application-team-1-tpp-access-token
fields: [ "access-token" ] # the field name in the Kubernetes Secret
Copy to clipboard

Next Steps

On this page