This will demonstrate how we stored Honeycomb API Key securely in Hashicorp Vault when configuring our OpenTelemetry Plugin. With this feature, you can securely rotate your secrets at your own secrets management solutions
Create your own .env file and provide the required values. They are required to run the containers.
VAULT_DEV_ROOT_TOKEN_ID=
POSTGRES_PASSWORD=
For Kong enterprise users, you can load the license by sending a request Kong Admin API
http POST :8001/licenses \
payload='LICENSE_KEY'
The docker compose will spin up Kong Gateway, Postgres and Hashicorp Vault
- Start Docker Compose
docker-compose up -d
- Tear-down
docker-compose down
Reference value in vault.example.yaml
This will create a vault entity in Kong,which contains information on how Kong can authenticate and retrieve secrets from Hashicorp Vault.
deck sync --kong-addr=http://localhost:8001 -s config/vault.yaml
More configuration for Kong x HCV can be found here: https://docs.konghq.com/gateway/3.4.x/kong-enterprise/secrets-management/backends/hashicorp-vault/
http --quiet $VAULT_URL/v1/<mount>/data/honeycomb 'data:={"key":"value"}' X-Vault-Token:<mytoken>
http :8001/services url=https://mockbin.org/request name=ot-demo
http :8001/services/ot-demo/routes name=ot-route expression='(http.path ^= "/ot2" || http.path ^= "/ot1")'
deck sync --kong-addr=http://localhost:8001 -s config/otel.yaml
http POST :8000/ot1 "X-Foo:hello OT1"
http GET :8000/ot2 "X-Foo:hello OT2"
You should see the trace coming in your Honeycomb dashboard