Kubernetes Secrets
Since Camel 2.17
Only producer is supported
The Kubernetes Secrets component is one of Kubernetes Components which provides a producer to execute Kubernetes Secrets operations.
Configuring Options
Camel components are configured on two separate levels:
-
component level
-
endpoint level
Configuring Component Options
At the component level, you set general and shared configurations that are, then, inherited by the endpoints. It is the highest configuration level.
For example, a component may have security settings, credentials for authentication, urls for network connection and so forth.
Some components only have a few options, and others may have many. Because components typically have pre-configured defaults that are commonly used, then you may often only need to configure a few options on a component; or none at all.
You can configure components using:
-
the Component DSL.
-
in a configuration file (
application.properties
,*.yaml
files, etc). -
directly in the Java code.
Configuring Endpoint Options
You usually spend more time setting up endpoints because they have many options. These options help you customize what you want the endpoint to do. The options are also categorized into whether the endpoint is used as a consumer (from), as a producer (to), or both.
Configuring endpoints is most often done directly in the endpoint URI as path and query parameters. You can also use the Endpoint DSL and DataFormat DSL as a type safe way of configuring endpoints and data formats in Java.
A good practice when configuring options is to use Property Placeholders.
Property placeholders provide a few benefits:
-
They help prevent using hardcoded urls, port numbers, sensitive information, and other settings.
-
They allow externalizing the configuration from the code.
-
They help the code to become more flexible and reusable.
The following two sections list all the options, firstly for the component followed by the endpoint.
Component Options
The Kubernetes Secrets component supports 3 options, which are listed below.
Name | Description | Default | Type |
---|---|---|---|
Autowired To use an existing kubernetes client. |
KubernetesClient |
||
Whether the producer should be started lazy (on the first message). By starting lazy you can use this to allow CamelContext and routes to startup in situations where a producer may otherwise fail during starting and cause the route to fail being started. By deferring this startup to be lazy then the startup failure can be handled during routing messages via Camel’s routing error handlers. Beware that when the first message is processed then creating and starting the producer may take a little time and prolong the total processing time of the processing. |
false |
boolean |
|
Whether autowiring is enabled. This is used for automatic autowiring options (the option must be marked as autowired) by looking up in the registry to find if there is a single instance of matching type, which then gets configured on the component. This can be used for automatic configuring JDBC data sources, JMS connection factories, AWS Clients, etc. |
true |
boolean |
Endpoint Options
The Kubernetes Secrets endpoint is configured using URI syntax:
kubernetes-secrets:masterUrl
With the following path and query parameters:
Path Parameters (1 parameters)
Name | Description | Default | Type |
---|---|---|---|
Required URL to a remote Kubernetes API server. This should only be used when your Camel application is connecting from outside Kubernetes. If you run your Camel application inside Kubernetes, then you can use local or client as the URL to tell Camel to run in local mode. If you connect remotely to Kubernetes, then you may also need some of the many other configuration options for secured connection with certificates, etc. |
String |
Query Parameters (21 parameters)
Name | Description | Default | Type |
---|---|---|---|
The Kubernetes API Version to use. |
String |
||
The dns domain, used for ServiceCall EIP. |
String |
||
Default KubernetesClient to use if provided. |
KubernetesClient |
||
The namespace. |
String |
||
Producer operation to do on Kubernetes. |
String |
||
The port name, used for ServiceCall EIP. |
String |
||
The port protocol, used for ServiceCall EIP. |
tcp |
String |
|
Whether the producer should be started lazy (on the first message). By starting lazy you can use this to allow CamelContext and routes to startup in situations where a producer may otherwise fail during starting and cause the route to fail being started. By deferring this startup to be lazy then the startup failure can be handled during routing messages via Camel’s routing error handlers. Beware that when the first message is processed then creating and starting the producer may take a little time and prolong the total processing time of the processing. |
false |
boolean |
|
Connection timeout in milliseconds to use when making requests to the Kubernetes API server. |
Integer |
||
The CA Cert Data. |
String |
||
The CA Cert File. |
String |
||
The Client Cert Data. |
String |
||
The Client Cert File. |
String |
||
The Key Algorithm used by the client. |
String |
||
The Client Key data. |
String |
||
The Client Key file. |
String |
||
The Client Key Passphrase. |
String |
||
The Auth Token. |
String |
||
Password to connect to Kubernetes. |
String |
||
Define if the certs we used are trusted anyway or not. |
Boolean |
||
Username to connect to Kubernetes. |
String |
Message Headers
The Kubernetes Secrets component supports 6 message header(s), which is/are listed below:
Name | Description | Default | Type |
---|---|---|---|
CamelKubernetesOperation (producer) Constant: |
The Producer operation. |
String |
|
CamelKubernetesNamespaceName (producer) Constant: |
The namespace name. |
String |
|
CamelKubernetesSecretsLabels (producer) Constant: |
The secret labels. |
Map |
|
CamelKubernetesSecretName (producer) Constant: |
The secret name. |
String |
|
CamelKubernetesSecret (producer) Constant: |
A secret object. |
Secret |
|
CamelKubernetesSecretsAnnotations (producer) Constant: |
The secret annotations. |
Map |
Example
Kubernetes Secrets Producer Examples
-
listSecrets
: this operation lists the secrets on a kubernetes cluster
from("direct:list").
toF("kubernetes-secrets:///?kubernetesClient=#kubernetesClient&operation=listSecrets").
to("mock:result");
This operation returns a list of secrets from your cluster
-
listSecretsByLabels
: this operation lists the Secrets by labels on a kubernetes cluster
from("direct:listByLabels").process(new Processor() {
@Override
public void process(Exchange exchange) throws Exception {
Map<String, String> labels = new HashMap<>();
labels.put("key1", "value1");
labels.put("key2", "value2");
exchange.getIn().setHeader(KubernetesConstants.KUBERNETES_SECRETS_LABELS, labels);
}
});
toF("kubernetes-secrets:///?kubernetesClient=#kubernetesClient&operation=listSecretsByLabels").
to("mock:result");
This operation returns a list of Secrets from your cluster using a label selector (with key1 and key2, with value value1 and value2)
Using secrets properties function with Kubernetes
The camel-kubernetes
component include the following secrets related functions:
-
secret
- A function to lookup the string property from Kubernetes Secrets. -
secret-binary
- A function to lookup the binary property from Kubernetes Secrets.
Camel reads Secrets from the Kubernetes API Server. And when RBAC is enabled on the cluster, the ServiceAccount that is used to run the application needs to have the proper permissions for such access.
Before the Kubernetes property placeholder functions can be used they need to be configured with either (or both)
-
path - A mount path that must be mounted to the running pod, to load the configmaps or secrets from local disk.
-
kubernetes client - Autowired An
io.fabric8.kubernetes.client.KubernetesClient
instance to use for connecting to the Kubernetes API server.
Camel will first use mount paths (if configured) to lookup, and then fallback to use the KubernetesClient
.
A secret named mydb
could contain username and passwords to connect to a database such as:
myhost = killroy
myport = 5555
myuser = scott
mypass = tiger
This can be used in Camel with for example the Postrgres Sink Kamelet:
<camelContext>
<route>
<from uri="direct:rome"/>
<setBody>
<constant>{ "username":"oscerd", "city":"Rome"}</constant>
</setBody>
<to uri="kamelet:postgresql-sink?serverName={{secret:mydb/myhost}}
&serverPort={{secret:mydb/myport}}
&username={{secret:mydb/myuser}}
&password={{secret:mydb/mypass}}
&databaseName=cities
&query=INSERT INTO accounts (username,city) VALUES (:#username,:#city)"/>
</route>
</camelContext>
The postgres-sink Kamelet can also be configured in application.properties
which reduces the configuration
in the route above:
camel.component.kamelet.postgresql-sink.databaseName={{secret:mydb/myhost}}
camel.component.kamelet.postgresql-sink.serverPort={{secret:mydb/myport}}
camel.component.kamelet.postgresql-sink.username={{secret:mydb/myuser}}
camel.component.kamelet.postgresql-sink.password={{secret:mydb/mypass}}
Which reduces the route to:
<camelContext>
<route>
<from uri="direct:rome"/>
<setBody>
<constant>{ "username":"oscerd", "city":"Rome"}</constant>
</setBody>
<to uri="kamelet:postgresql-sink?databaseName=cities
&query=INSERT INTO accounts (username,city) VALUES (:#username,:#city)"/>
</route>
</camelContext>
Automatic Camel context reloading on Secret Refresh
Being able to reload Camel context on a Secret Refresh could be done by specifying the following properties:
camel.vault.kubernetes.refreshEnabled=true
camel.vault.kubernetes.secrets=Secret
camel.main.context-reload-enabled = true
where camel.vault.kubernetes.refreshEnabled
will enable the automatic context reload and camel.vault.kubernetes.secrets
is a regex representing or a comma separated lists of the secrets we want to track for updates.
Whenever a secrets listed in the property, will be updated in the same namespace of the running application, the Camel context will be reloaded, refreshing the secret value.