This guide walks through the process of creating a central configuration management for microservices using Spring Cloud Config integrating with HashiCorp Vault.
Introduction
Nowadays, software is commonly delivered as a service and doesn’t matter the programming language that was chosen, it’s always good to follow the twelve-factor app methodology.
The first factor is about the codebase, it starts saying:
One codebase tracked in revision control, many deploys
It means that the same codebase needs to be deployed in multiple environments without any change other than the configuration, which brings us to the externalized configuration.
If you are working (or going to work) with microservices in an elastic environment, you probably noticed the need for a central place for configuration management, and that’s also one of the twelve-factors.
Pre-req
- JDK 1.8
- Text editor or your favorite IDE
- Maven 3.0+
- Docker
Spring Cloud Config
Spring Cloud Config provides server and client-side support for externalized configuration in a distributed system and it has quite few backend storage support, this guide covers the following:
Setting the Config Server
The easiest way to set up a Config Server is reaching start.spring.io, search for Config Server
in the dependencies
search box and hit the Generate Project
button, it will generate a zip file containing the
Config Server
project with all the necessary dependencies. Unzip the project, open the main class and add the
@EnableConfigServer
on the class level.
You need to end up with something like this:
import org.springframework.boot.SpringApplication;
import org.springframework.boot.autoconfigure.SpringBootApplication;
import org.springframework.cloud.config.server.EnableConfigServer;
@EnableConfigServer
@SpringBootApplication
public class ConfigServerApplication {
public static void main(String[] args) {
SpringApplication.run(ConfigServerApplication.class, args);
}
}
The generated project has an application.properties
file placed at src/main/resources
, for personal preferences
I renamed it to application.yml
.
Open the application.yml
file and add the following configuration, as I’m running all the applications in the same
host it’s important to change the server.port
.
server:
port: 8888
spring:
application:
name: configserver
Profiles & Auto of the box implementations
Spring Cloud Config Server uses profiles
to provide multiple auto of the box backend storages implementations, let’s
walk through some of them.
File System Backend
There’s a native
profile available where the Config Server
searches for the properties/YAML files from the local classpath
or file system.
spring:
profiles:
active: native
The default value of the searchLocations is identical to a local Spring Boot application (that is,
[classpath:/, classpath:/config, file:./, file:./config]
). This does not expose the application.properties
from the server to all clients, because any property sources present in the server are removed before being
sent to the client.
You can point to any location using spring.cloud.config.server.native.searchLocations
.
Remember to use the file: prefix for file
resources (the default without a prefix is usually the classpath).
As with any Spring Boot configuration, you can embed ${}
-style environment placeholders, but remember that absolute
paths in Windows require an extra / (for example, file:///${user.home}/config-repo
).
For this guide I’ll create a folder named config-repo
in the ${user.home}
, this new folder is created to store the
configuration files for the native profile.
Now add the following configuration to application.yml
.
spring:
cloud:
config:
server:
native:
searchLocations: file://${user.home}/config-repo
Now create the file config-repo/configclient.yml
, this file stores the configuration for our microservice (created later
in this guide) named configclient
, and add the following configuration.
client:
pseudo:
property: Property value loaded from File System
Now you can start the application and hit the endpoint http://localhost:8888/configclient/default
, the response will be:
{
"name":"configclient",
"profiles":[
"default"
],
"label":null,
"version":null,
"state":null,
"propertySources":[
{
"name":"file:///Users/my-user/config-repo/configclient.yml",
"source":{
"client.pseudo.property":"Property value loaded from File System"
}
}
]
}
The native
profile is a good way to start with Config Server
on the local environment, but I don’t recommend
anyone to go to production using a file system based storage.
Git Backend
There’s also a git
profile where you can point to an external git repository that contains all the configurations files
for your microservices. To make it work you can either add the git
profile to the active profiles or totally remove the
spring.profiles.active
properties. If you choose to keep this property, the last specified profile has priority and
overrides all the previously defined.
Add the following config:
spring:
profiles:
active: native, git
cloud:
config:
server:
git:
uri: https://github.com/weekly-drafts/config-repo-spring-cloud-configserver-vault
Here’s the full configuration for reference:
spring:
profiles:
active: native, git
application:
name: configserver
cloud:
config:
server:
native:
searchLocations: file://${user.home}/config-repo
git:
uri: https://github.com/weekly-drafts/config-repo-spring-cloud-configserver-vault
Now if you hit the http://localhost:8888/configclient/default
again, there will be the following result:
{
"name":"configclient",
"profiles":[
"default"
],
"label":null,
"version":null,
"state":null,
"propertySources":[
{
"name":"file:///Users/my-user/config-repo/configclient.yml",
"source":{
"client.pseudo.property":"Property value loaded from File System"
}
},
{
"name":"https://github.com/weekly-drafts/config-repo-spring-cloud-configserver-vault/configclient.yml",
"source":{
"client.pseudo.property":"Property value loaded from Git"
}
}
]
}
If no profile is set git
is the default one.
Vault Backend
About Vault:
Vault is a tool for securely accessing secrets. A secret is anything that to which you want to tightly control access, such as API keys, passwords, certificates, and other sensitive information. Vault provides a unified interface to any secret while providing tight access control and recording a detailed audit log.
There’s also a vault
profile that enables integration with Vault to securely store the application properties,
in this part, we’ll be using docker
to create a vault
container.
Create a vault container:
docker run -d -p 8200:8200 --name vault -e 'VAULT_DEV_ROOT_TOKEN_ID=myroot' -e 'VAULT_DEV_LISTEN_ADDRESS=0.0.0.0:8200' vault
It’s specified the root token here, do not do that in production.
Enter in the vault container and authenticate to vault:
docker exec -i -t vault sh
export VAULT_ADDR='http://localhost:8200'
vault auth myroot
Now it’s time to write our secret property:
vault write secret/configclient client.pseudo.property="Property value loaded from Vault"
Now we have everything in place, it’s time to configure our Config Server
to talk to Vault
, add the following properties:
spring:
profiles:
active: vault
cloud:
config:
server:
vault:
port: 8200
host: 127.0.01
Complete configuration for reference:
spring:
profiles:
active: native, git, vault
application:
name: configserver
cloud:
config:
server:
native:
searchLocations: file://${user.home}/config-repo
git:
uri: https://github.com/weekly-drafts/config-repo-spring-cloud-configserver-vault
vault:
port: 8200
host: 127.0.01
You can also secure properties without vault using encryption.
Setting the Config Client
As before, the easiest way to create the config client
is reaching start.spring.io and adding
Config Client
and Web
dependencies. Open the generated project, add a resources/bootstrap.yml
with the following
content.
spring:
application:
name: configclient
cloud:
config:
token: myroot
uri: http://localhost:8888
It’s important to add exactly configclient
as spring.application.name
because that’s the name used to bind to the external configuration.
Now open the main class and add a @Value
to recover our pseudo
property and return it to an endpoint, here’s my main class for reference.
@RestController
@SpringBootApplication
public class ConfigClientApplication {
public static void main(String[] args) {
SpringApplication.run(ConfigClientApplication.class, args);
}
@Value("${client.pseudo.property}")
private String pseudoProperty;
@GetMapping("/property")
public ResponseEntity<String> getProperty() {
return ResponseEntity.ok(pseudoProperty);
}
}
After starting the project, you’ll be able to reach http://localhost:8080/property
and the expected result is:
Property value loaded from Vault
Summary
Congratulations! You just created a central configuration management using Spring Cloud Config and secured all your secrets with HashiCorp Vault.
Footnote
- The code used for this tutorial can be found on github
- Spring Cloud Config Docs