From aa3e518e890f5bfcaa955aba691a64be9365fa3a Mon Sep 17 00:00:00 2001 From: Deepika Ranganathan <162723372+drangana3@users.noreply.github.com> Date: Tue, 7 Apr 2026 12:20:41 -0500 Subject: [PATCH 1/2] Update vault secret csi guide for 4.20 validation Added tags and 4.20 validation. --- content/misc/secrets-store-csi/hashicorp-vault.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/content/misc/secrets-store-csi/hashicorp-vault.md b/content/misc/secrets-store-csi/hashicorp-vault.md index cdf73dd03..dccdd0889 100644 --- a/content/misc/secrets-store-csi/hashicorp-vault.md +++ b/content/misc/secrets-store-csi/hashicorp-vault.md @@ -2,9 +2,10 @@ date: '2021-08-18' title: Installing the HashiCorp Vault Secret CSI Driver aliases: ['/experts/security/secrets-store-csi/hashicorp-vault'] -tags: ["ROSA", "ARO", "OSD", "Miscellaneous"] +tags: ["ROSA", "ARO", "OSD"] authors: - Connor Wooley +validated_version: "4.20" --- The HashiCorp Vault Secret CSI Driver allows you to access secrets stored in HashiCorp Vault as Kubernetes Volumes. From d1fc9c19c05aa3e3516fa0a171d927274fce23ca Mon Sep 17 00:00:00 2001 From: Deepika Ranganathan <162723372+drangana3@users.noreply.github.com> Date: Thu, 9 Apr 2026 14:48:08 -0500 Subject: [PATCH 2/2] Update vault-csi image --- .../misc/secrets-store-csi/hashicorp-vault.md | 27 +++++++++++++++---- 1 file changed, 22 insertions(+), 5 deletions(-) diff --git a/content/misc/secrets-store-csi/hashicorp-vault.md b/content/misc/secrets-store-csi/hashicorp-vault.md index dccdd0889..746cfc4d0 100644 --- a/content/misc/secrets-store-csi/hashicorp-vault.md +++ b/content/misc/secrets-store-csi/hashicorp-vault.md @@ -5,6 +5,8 @@ aliases: ['/experts/security/secrets-store-csi/hashicorp-vault'] tags: ["ROSA", "ARO", "OSD"] authors: - Connor Wooley + - Kevin Collins + - Deepika Ranganathan validated_version: "4.20" --- @@ -48,19 +50,31 @@ The HashiCorp Vault Secret CSI Driver allows you to access secrets stored in Has 1. Create a values file for Helm to use ```bash - cat << EOF > values.yaml + export SCRATCH_DIR=~/tmp/vault + mkdir -p $SCRATCH_DIR + cat << EOF > "${SCRATCH_DIR}/values.yaml" global: openshift: true + csi: enabled: true + image: + repository: "docker.io/hashicorp/vault-csi-provider" + tag: "1.7.0" + agent: + image: + repository: "registry.connect.redhat.com/hashicorp/vault" + tag: "1.17.2-ubi" daemonSet: providersDir: /var/run/secrets-store-csi-providers + injector: enabled: false + server: image: repository: "registry.connect.redhat.com/hashicorp/vault" - tag: "1.8.0-ubi" + tag: "1.17.2-ubi" dev: enabled: true EOF @@ -72,7 +86,7 @@ The HashiCorp Vault Secret CSI Driver allows you to access secrets stored in Has helm install -n hashicorp-vault vault \ hashicorp/vault --values values.yaml ``` - + 1. Patch the CSI daemonset > Currently the CSI has a bug in its manifest which we need to patch @@ -153,7 +167,7 @@ The HashiCorp Vault Secret CSI Driver allows you to access secrets stored in Has ```bash cat <