You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+30-2Lines changed: 30 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -802,7 +802,21 @@ If the `databases` array is empty or not provided for a metric, that metric will
802
802
803
803
### Using OCI Vault
804
804
805
-
The exporter will read the password from a secret stored in OCI Vault if you set these two environment variables:
805
+
Each database in the config file may be configured to use OCI Vault. To load the database username and/or password from OCI Vault, set the `vault.oci` property to contain the OCI Vault OCID, and secret names for the database username/password:
806
+
807
+
```yaml
808
+
databases:
809
+
mydb:
810
+
vault:
811
+
oci:
812
+
id: <VAULT OCID>
813
+
usernameSecret: <Secret containing DB username>
814
+
passwordSecret: <Secret containing DB password>
815
+
```
816
+
817
+
#### OCI Vault CLI Configuration
818
+
819
+
If using the default database with CLI parameters, the exporter will read the password from a secret stored in OCI Vault if you set these two environment variables:
806
820
807
821
- `OCI_VAULT_ID` should be set to the OCID of the OCI vault that you wish to use
808
822
- `OCI_VAULT_SECRET_NAME` should be set to the name of the secret in the OCI vault which contains the database password
@@ -811,7 +825,21 @@ The exporter will read the password from a secret stored in OCI Vault if you set
811
825
812
826
### Using Azure Vault
813
827
814
-
The exporter will read the database username and password from secrets stored in Azure Key Vault if you set these environment variables:
828
+
Each database in the config file may be configured to use Azure Vault. To load the database username and/or password from Azure Vault, set the `vault.azure` property to contain the Azure Vault ID, and secret names for the database username/password:
829
+
830
+
```yaml
831
+
databases:
832
+
mydb:
833
+
vault:
834
+
azure:
835
+
id: <VAULT ID>
836
+
usernameSecret: <Secret containing DB username>
837
+
passwordSecret: <Secret containing DB password>
838
+
```
839
+
840
+
#### Azure Vault CLI Configuration
841
+
842
+
If using the default database with CLI parameters, the exporter will read the database username and password from secrets stored in Azure Key Vault if you set these environment variables:
815
843
816
844
- `AZ_VAULT_ID` should be set to the ID of the Azure Key Vault that you wish to use
817
845
- `AZ_VAULT_USERNAME_SECRET` should be set to the name of the secret in the Azure Key Vault which contains the database username
logger.Warn("Configuring default database from CLI parameters is deprecated. Use of the '--config.file' argument is preferred. See https://github.com/oracle/oracle-db-appdev-monitoring?tab=readme-ov-file#standalone-binary")
130
176
m.Databases=make(map[string]DatabaseConfig)
131
177
m.Databases["default"] =m.defaultDatabase(cfg)
132
178
}
133
179
134
180
m.merge(cfg, path)
135
-
136
-
// TODO: rework vault support for multi-database.
137
-
// Currently, the vault user/password is applied for every database.
138
-
// It must be configurable at the database level for true multi-database support.
0 commit comments