Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
11 changes: 11 additions & 0 deletions docs/docs/operation/creds/vault.md
Original file line number Diff line number Diff line change
Expand Up @@ -143,6 +143,17 @@ vault policy write concourse ./concourse-policy.hcl
This configuration will allow Concourse to read all credentials under `/concourse`. This should match your configured
path prefix.

### Enabling KV mount caching

When Concourse looks up secrets in Vault, it needs to determine which KV mount version (v1 or v2) contains the secret.
By default, this information is fetched from Vault for each lookup. Enabling KV mount caching allows this information to be fetched once and reused for subsequent lookups, significantly reducing the number of Vault API calls.

To enable KV mount caching, set the following environment variable on the `web` node:

```properties
CONCOURSE_VAULT_ENABLE_KV_MOUNT_CACHE=true
```

## Authenticating with Vault

There are many ways to authenticate with a Vault server. The `web` node can be configured with either a token or an
Expand Down
8 changes: 7 additions & 1 deletion docs/docs/vars.md
Original file line number Diff line number Diff line change
Expand Up @@ -417,7 +417,13 @@ used just like resource types.

When retrying during authentication, start with this retry interval. The interval will increase
exponentially until `auth_retry_max` is reached.


??? info "**`enable_kv_mount_cache`**: [`boolean`](config-basics.md#boolean-schema)"

By default, this feature is disabled. When disabled, Concourse queries Vault on every secret lookup to determine whether the secret resides in a KV version 1 or version 2 mount, as this affects how the secret is retrieved.

When enabled, KV mount metadata is cached. This allows Concourse to fetch mount information once and reuse it for subsequent lookups, reducing the number of Vault API calls and improving performance.

=== "Dummy"

??? warning "**`type`**: `dummy`"
Expand Down