HashiCorp Vault
Prerequisites
- A running Vault instance with the KV v2 secrets engine enabled
- A Vault token with read/write/delete/list permissions on your path
VAULT_TOKENset on the ev API server
Step 1: Enable KV v2 (if not already)
Step 2: Create a Policy
Step 3: Configure Credentials
Set VAULT_TOKEN on the ev API server:
Step 4: Connect
To use a custom KV mount:
Step 5: Import Existing Secrets
How Secrets Are Stored
Each secret is stored as a separate KV entry:
Each entry contains {"value": "the-secret-value"} as the KV data.
Limitations
- No rollback: Same as AWS SM — ev doesn't store values for external backends
- No E2E encryption: Secrets stored as plaintext in Vault
- VAULT_TOKEN required: The API server needs a valid token. Use Vault agent or auto-auth for production.